Huawei Cloud Stack 8.3.0 Solution Description 011
Huawei Cloud Stack 8.3.0 Solution Description 011
8.3.0
Solution Description
Issue 01
Date 2023-09-30
and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei
Cloud and the customer. All or part of the products, services and features described in this document may
not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all
statements, information, and recommendations in this document are provided "AS IS" without
warranties, guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huaweicloud.com/intl/en-us/
Overview
Huawei Cloud Stack is a hybrid cloud solution that can be used to manage
physically distributed, logically unified resources. This document describes the
overview, architecture, application scenarios, components, and cloud services of
the Huawei Cloud Stack solution.
Intended Audience
This document is intended for:
● Pre-sales engineers
● Technical support engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Change History
Issue Date Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. iii
Huawei Cloud Stack
Solution Description Contents
Contents
2 Application Scenarios........................................................................................................... 27
3 Architecture............................................................................................................................ 31
3.1 Function Architecture.......................................................................................................................................................... 31
3.2 Deployment Architecture................................................................................................................................................... 33
3.2.1 Region Deployment Principles...................................................................................................................................... 34
3.2.2 Typical Deployment Architecture................................................................................................................................. 38
3.2.3 Node Types and Deployment Details......................................................................................................................... 53
3.3 Network Architecture.......................................................................................................................................................... 58
3.4 Time Synchronization.......................................................................................................................................................... 58
3.5 Tool Overview........................................................................................................................................................................ 61
4 System Security......................................................................................................................66
5 Infrastructure and Resource Pools.................................................................................... 70
5.1 Overview.................................................................................................................................................................................. 70
5.2 Product Architecture............................................................................................................................................................ 71
6 Cloud Management.............................................................................................................. 73
6.1 Overview.................................................................................................................................................................................. 73
6.2 Architecture............................................................................................................................................................................. 82
6.2.1 Product Architecture......................................................................................................................................................... 82
6.2.2 External APIs....................................................................................................................................................................... 86
6.3 Node Planning....................................................................................................................................................................... 87
6.4 ServiceCenter.......................................................................................................................................................................... 92
6.4.1 Introduction......................................................................................................................................................................... 92
6.4.2 Enterprise-oriented Cloud Organizational Architecture Design........................................................................ 93
6.4.3 IT Service Supply................................................................................................................................................................ 94
6.4.4 IT Service Consumption................................................................................................................................................... 95
6.4.5 Key Features........................................................................................................................................................................ 95
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. vii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. viii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xiii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xiv
Huawei Cloud Stack
Solution Description Contents
10 Security Services................................................................................................................543
10.1 Security Index Service (SIS).......................................................................................................................................... 543
10.1.1 What Is Security Index Service?............................................................................................................................... 543
10.1.2 Related Concepts.......................................................................................................................................................... 543
10.1.2.1 ACL Permission...........................................................................................................................................................543
10.1.3 Advantages..................................................................................................................................................................... 544
10.1.4 Application Scenarios.................................................................................................................................................. 544
10.1.5 Implementation Principles......................................................................................................................................... 544
10.1.6 Related Services............................................................................................................................................................ 545
10.1.7 Accessing and Using SIS............................................................................................................................................. 546
10.2 EdgeFW................................................................................................................................................................................546
10.2.1 What Is Edge Firewall?............................................................................................................................................... 546
10.2.2 Related Concepts.......................................................................................................................................................... 547
10.2.2.1 Firewall......................................................................................................................................................................... 547
10.2.2.2 Policy Group Rules.................................................................................................................................................... 547
10.2.3 Advantages..................................................................................................................................................................... 547
10.2.4 Application Scenarios.................................................................................................................................................. 547
10.2.5 Implementation Principles......................................................................................................................................... 548
10.2.6 Related Services............................................................................................................................................................ 550
10.2.7 Accessing and Using EdgeFW...................................................................................................................................550
10.3 Key Management Service (KMS)................................................................................................................................ 550
10.3.1 What Is Key Management Service?........................................................................................................................550
10.3.2 Related Concepts.......................................................................................................................................................... 551
10.3.2.1 CMK................................................................................................................................................................................551
10.3.2.2 Default Master Key................................................................................................................................................... 552
10.3.2.3 DEK................................................................................................................................................................................. 552
10.3.2.4 HSM............................................................................................................................................................................... 552
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xvi
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xvii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xviii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xix
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxi
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxiii
Huawei Cloud Stack
Solution Description Contents
15 EI Services......................................................................................................................... 1136
15.1 MapReduce Service (MRS)......................................................................................................................................... 1136
15.1.1 What Is MRS?.............................................................................................................................................................. 1136
15.1.2 Applicable Objects and Scenarios of MRS......................................................................................................... 1140
15.1.3 Basic Concepts............................................................................................................................................................. 1141
15.1.4 Node Types................................................................................................................................................................... 1141
15.1.5 Components................................................................................................................................................................. 1142
15.1.5.1 CarbonData............................................................................................................................................................... 1142
15.1.5.2 CDL.............................................................................................................................................................................. 1144
15.1.5.2.1 CDL Basic Principles............................................................................................................................................ 1144
15.1.5.2.2 Relationship Between CDL and Other Components............................................................................... 1146
15.1.5.3 ClickHouse................................................................................................................................................................. 1146
15.1.5.3.1 Basic Principle....................................................................................................................................................... 1146
15.1.5.3.2 Key Features.......................................................................................................................................................... 1148
15.1.5.3.3 Relationship with Other Components.......................................................................................................... 1150
15.1.5.3.4 ClickHouse Enhanced Open Source Features............................................................................................ 1151
15.1.5.4 Containers................................................................................................................................................................. 1151
15.1.5.4.1 ALB Basic Principles............................................................................................................................................ 1151
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxiv
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxv
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxvi
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxvii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxviii
Huawei Cloud Stack
Solution Description Contents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxix
Huawei Cloud Stack
Solution Description Contents
15.7.2.5 Concepts.....................................................................................................................................................................1503
15.7.3 AIVS................................................................................................................................................................................. 1506
15.7.3.1 What Is AIVS?........................................................................................................................................................... 1506
15.7.3.2 Scenarios.................................................................................................................................................................... 1506
15.7.3.3 Constraints................................................................................................................................................................ 1507
15.7.3.4 Related Services.......................................................................................................................................................1508
15.8 AI Kits................................................................................................................................................................................. 1508
15.8.1 What Is AI Kits?........................................................................................................................................................... 1508
15.8.2 Function Description................................................................................................................................................. 1509
15.8.2.1 SIS.................................................................................................................................................................................1509
15.8.2.2 OCR.............................................................................................................................................................................. 1511
15.8.2.2.1 General OCR.......................................................................................................................................................... 1511
15.8.2.2.2 Auto Classification OCR.................................................................................................................................... 1512
15.8.2.2.3 Card OCR................................................................................................................................................................ 1513
15.8.2.2.4 Receipt OCR...........................................................................................................................................................1514
15.8.2.3 TFDS............................................................................................................................................................................ 1515
15.8.3 Application Scenarios................................................................................................................................................ 1515
15.8.4 Related Services.......................................................................................................................................................... 1517
15.8.5 Constraints.................................................................................................................................................................... 1518
18 Glossary.............................................................................................................................1545
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. xxx
Huawei Cloud Stack
Solution Description 1 Overview
1 Overview
Challenges
Challenges faced by different industries in enterprise DCs and requirements for IT
systems are as follows:
● Government industry develops from decentralized e-government to data-
intensive smart city, requiring IT systems to develop from traditional silo
architecture to cloud-based transformation to implement resource integration
and data convergence.
– The original government DCs are faced with problems of isolated
cooperation, siloed-type and repeated construction, and heavy
investment in manpower and expenditure.
– Applications are bound to resources. Each application is configured based
on the peak-hour service load. Many resources are not fully utilized at
most times, resulting low resource utilization. Additionally, complicated
installation, configuration, and maintenance as well as the inefficient
service deployment lead to inconvenient migration.
– The construction process of traditional DC is slow because of multi-phase
plannings, long construction period, and low efficiency.
– The security protection capabilities are insufficient.
● New technologies promote digital transformation of the financial industry.
Requirements of the digital transformation are as follows:
– Service innovation: Online, interactive, and remote service modes are
required.
their lifecycles. The essence of Huawei Cloud Stack is physical distribution and
logical unification.
● Physical distribution
Physical distribution indicates that multiple DCs of an enterprise are
distributed in different regions. By deploying a unified cloud platform,
enterprises can consolidate physically dispersed IT resources to enable unified
service provisioning.
● Logical unification
Logical unification indicates that DC management software uniformly
manages multiple DCs in different regions. It involves the following aspects:
– Provides a unified O&M platform to manage and schedule resources from
DCs in different regions.
– Provides a unified operation management platform, which manages
cloud services through a unified operation management interface.
Decouples cloud services with the operation management module, which
eases the tight coupling of multiple components and accelerates version
release.
Features
● Reliability
This solution enhances the reliability of the entire system, a single device, and
data. The distributed architecture of the cloud platform improves the overall
system reliability and reduces the system reliance on the reliability of a single
device.
● Availability
The system delivers remarkable availability by employing hardware/link
redundancy deployments, high-availability clusters, loose coupling between
applications and underlying devices, and application fault tolerance (FT)
features.
● Security
The solution complies with the industry security specifications is designed to
ensure the security of data centers. It focuses on the security of networks,
hosts, virtualization, and data.
● Maturity
Huawei Cloud Stack uses the architecture solution, hardware and software
that are tested in large-scale commercial practices, and IT management
solution that complies with the Information Technology Infrastructure Library
(ITIL) standards to ensure the solution maturity.
● Advancement
Customer benefits are highlighted using the advanced cloud computing
technology and idea. Advanced technologies and modes such as virtualization
and dynamic resource deployment are used with services, ensuring the validity
and applicability of advanced technologies and modes.
● Scalability
DC resources must be flexibly adjusted to meet actual service load
requirements, and the IT infrastructure must be loosely coupled with service
systems. Therefore, users only need to add IT hardware devices when service
systems require capacity expansion.
● Openness
FusionSphere is compatible with open-source OpenStack APIs. It embraces the
industry ecosystem and minimizes the investments on resource pools. With
close cooperation with ISVs in the industry, Huawei Cloud Stack fully
unleashes the power of cloud-based applications.
Cloud Description
Service/
Common
Compone
nt
SFS Scalable File Service (SFS) provides fully-hosted shared file storage
for ECSs. In compliance with the Network File System (NFS and
CIFS) protocol, SFS can support storage of PB-level files. With the
scalable performance, SFS can seamlessly handle data-intensive
and high-bandwidth applications.
SFS-DJ, that is, OceanStor DJ (Manila), functions as the SFS server
and receives requests from the SFS Console.
Cloud Description
Service/
Common
Compone
nt
OBS 3.0 Object Storage Service (OBS) is a cloud storage service optimized
for storing massive amounts of data. It provides unlimited, secure,
and highly reliable storage capabilities. On OBS, you can easily
perform storage management operations, such as bucket creation,
modification, and deletion, as well as object upload, download, and
deletion.
OBS provides users with unlimited storage capacity, stores files in
any format, and caters to the needs of common users, websites,
enterprises, and developers. Neither the entire OBS system nor any
single bucket has limitations on storage capacity or the number of
objects/files that can be stored. OBS supports APIs over Hypertext
Transfer Protocol (HTTP) and Hypertext Transfer Protocol Secure
(HTTPS). You can use OBS Console or OBS clients to access and
manage data stored in OBS anytime, anywhere. With OBS-provided
APIs, you can easily manage data stored in OBS and develop upper-
layer service applications.
OBS can be deployed in multiple regions, delivering flexible
expansion and enhanced reliability. You can deploy OBS in specific
regions for faster access.
Cloud Description
Service/
Common
Compone
nt
Network A network access control list (ACL) is a security service for VPCs. It
ACL controls access to VPCs or subnets, supports blacklist and whitelist
policies (that is, permit and deny policies), and determines whether
data packets can flow into or out of VPCs or subnets based on the
inbound and outbound ACL rules associated with the VPCs or
subnets.
Cloud Description
Service/
Common
Compone
nt
SIS Security Index Service (SIS) is a security assessment service for your
cloud environment. It provides you with unified, clear, and multi-
dimensional security views.
EdgeFW Edge Firewall (EdgeFW) bridges the internal network and the
external network. EdgeFW provides border security protection for
the north-south traffic between the cloud data center and external
networks, and supports intrusion prevention system (IPS) and
network antivirus (AV) functions for EIPs.
Cloud Description
Service/
Common
Compone
nt
WAF Web Application Firewall (WAF) keeps web services stable and
secure. It examines all HTTP and HTTPS requests to detect and
block the following attacks: Structured Query Language (SQL)
injection, cross-site scripting (XSS), web shells, command and code
injections, file inclusion, sensitive file access, third-party
vulnerability exploits, Challenge Collapsar (CC) attacks, malicious
crawlers, and cross-site request forgery (CSRF).
CFWforHC Cloud Firewall 2.0 (Cloud Firewall for HCS, CFWforHCS) is a next-
S generation cloud-native firewall. It protects Internet and VPC
borders on the cloud by real-time intrusion detection and
prevention, global unified access control, full traffic analysis, log
audit, and tracing. CFW employs AI for intelligent defense, and can
be elastically scaled to meet changing business needs, helping you
easily handle security threats.
Cloud Description
Service/
Common
Compone
nt
Cloud Description
Service/
Common
Compone
nt
CSP Compute Security Platform (CSP) reviews server assets, and scans
for and reports intrusions, vulnerabilities (such as VM escape),
unsafe settings, suspicious programs, and file or website content
that has been tampered with. CSP helps enterprises manage
security of physical and virtual servers on the management planes
of their cloud platforms, detect intrusions in real time, and meet
compliance requirements.
CSP is deployed among the IaaS services in Huawei Cloud Stack. Its
functions are similar to those of HSS.
VBS Volume Backup Service (VBS) enables the system to create EVS
disk backups. The backups can be used to restore EVS disks,
maximizing user data accuracy and security and ensuring service
security.
● Karbor functions as the VBS backend which receives requests
from the VBS Console and invokes FusionSphere OpenStack
components.
● eBackup Server&Proxy functions as the VBS backend which
backs up data from the production storage to the backup
storage.
Cloud Description
Service/
Common
Compone
nt
Cloud Description
Service/
Common
Compone
nt
Cloud Description
Service/
Common
Compone
nt
Cloud Description
Service/
Common
Compone
nt
LTS Log Tank Service (LTS) collects log data from hosts and cloud
services. By processing massive amounts of logs efficiently, securely,
and in real time, LTS provides useful insights for you to optimize
the availability and performance of cloud services and applications.
It also helps you efficiently perform real-time decision-making,
device O&M, and service trend analysis.
Cloud Description
Service/
Common
Compone
nt
GES Graph Engine Service (GES) uses the self-developed EYWA kernel
to facilitate querying and analysis of graph-structure data based on
various relationships. It is specifically suited for scenarios requiring
analysis of rich relationship data, including social relationship
analysis, marketing recommendations, public opinions and social
listening, information communication, and anti-fraud.
Cloud Description
Service/
Common
Compone
nt
Cloud Description
Service/
Common
Compone
nt
Service Backed by open service APIs, O&M automation capabilities, and the
Builder government and enterprise process adaptation engine, Service
Builder provides a unified process and a robust ecosystem for
provisioning IT capabilities as services. You can quickly apply for,
provision, configure, and deploy IT resources and capabilities
online.
LVS Linux Virtual Server (LVS) is a Linux server cluster system that
provides level-1 load balancing for hybrid cloud common services.
Nginx Nginx provides a reverse proxy for the cloud service console page
to implement load balancing of services and data on each console
node and distribute traffic. Cloud service requests are delivered by
the LVS and forwarded to the Nginx. The Nginx forwards the cloud
service requests to the cloud service console.
HAProxy HAProxy: Provides load balancing for cloud services from the
console node to service node. Cloud service requests are sent from
the console node to HAProxy. Then HAProxy forwards the requests
to the required cloud service node.
API API Gateway: Provides API management as well as API intranet and
Gateway extranet isolation functions. When a user accesses a cloud service
API, the user does not call the service API directly, but accesses the
API of the service registered on API Gateway. In this way, invalid
requests are shielded, preventing the internal management API
from being exposed.
DNS Domain Name System (DNS) provides the domain name resolution
service for cloud services, ManageOne, and tenant VMs.
SDR Service Detail Record (SDR): Provides metering and charging files
of each cloud service.
EulerOS Management VMs where cloud services are deployed use EulerOS
as the operating system.
FusionCar A tool specific to O&M personnel for unified health check and
e FusionSphere offline log collection.
Cloud Description
Service/
Common
Compone
nt
Cloud Description
Service/
Common
Compone
nt
2 Application Scenarios
Hosting Cloud
Leveraging advantages of network and local services, carriers, industry leaders, or
ISPs can build a platform to provide full-stack cloud services and resources for
governments, enterprises, and industry customers in different industry scenarios in
offline mode. Figure 2-2 shows the architecture.
Multi-Cloud Management
Multi-Cloud Management includes Cloud Federation with Huawei Cloud Stack
Management and HCS Online Management.
The following describes the solution for deploying an independent global zone:
You can use HCC Turnkey to decouple an independent global zone from the
existing primary region of HUAWEI CLOUD Stack 6.5.1 and migrate data to the
global zone. After the migration, you need to clear the service data and resources
of the original global zone co-deployed with the primary region. Independent
deployment of a global zone applies to the following two scenarios: migration of
resources in an existing HUAWEI CLOUD Stack 6.5.1 site and construction of a
new Huawei Cloud Stack 8.2.0 site.
Disaster Recovery
● Cross-AZ HA on the management plane: If the production center becomes
faulty, you can continue to use the management plane to manage supported
cloud services in the DR center. For details about cloud services that support
management plane cross-AZ HA, see "DR Management" > "Management
Plane Cross-AZ HA DR Management" > "Applicable Cloud Service" in Huawei
Cloud Stack 8.3.0 O&M Guide.
● Management plane cross-region DR: If the production region becomes faulty,
you can restore management plane data in the DR region and continue to use
the management plane to manage supported cloud services. For details about
cloud services that support management plane cross-region DR, see "DR
Management" > "Management Plane Cross-Region DR Management" >
"Overview" in Huawei Cloud Stack 8.3.0 O&M Guide.
● Geo-redundant DR: The management plane is deployed at three data centers
located in two cities to achieve cross-AZ HA and cross-region DR. If both AZs
of the production site cannot provide services due to a disaster, you can use
the management plane of the DR center to manage supported cloud services.
For details about cloud services that support management plane geo-
redundant DR, see "DR Management" > "Management Plane Geo-Redundant
DR Management" > "Applicable Cloud Service" in Huawei Cloud Stack 8.3.0
O&M Guide.
3 Architecture
Table 3-1 describes the functions of each layer in Huawei Cloud Stack.
Resour Resource pools are built upon the physical infrastructure, which are
ce classified into computing, storage, and network resource pools.
pools FusionSphere OpenStack (data center virtualization software) provides
the resource pooling and management capabilities for virtual
computing, virtual storage, and virtual networks, and provides
management capabilities of resource pools.
● Virtualization pool
● Bare metal server pool
● Block storage pool
● File storage pool
● Network resource pool
● DR storage pool
● Backup storage pool
Other resource pools:
● Resource pool of Cloud Federation with Huawei Cloud Stack: The
peer Huawei Cloud Stack resource pool is connected to the local
cloud.
● Management plane hybrid cloud resource pool: Public cloud
resources are connected to Huawei Cloud Stack through API
adaptation.
Host A host group, a logical group A host group consists of servers in the
group in FusionSphere OpenStack, same hardware configurations (CPUs
consists of a group of and memory) and connected to the
physical hosts and related same shared or distributed storage.
metadata. Host groups are logically divided by the
administrator. For example, there can
be a bare metal server host group or a
KVM host group. It is recommended
that a host group contains a maximum
of 128 servers.
Figure 3-3 Architecture of co-deployment of the primary region and the global
zone in Huawei Cloud Stack
Figure 3-4 Architecture of the independent global zone deployed in Huawei Cloud
Stack (only converged SDN supported)
For details about how to migrate resources of HUAWEI CLOUD Stack 6.5.1 to the
independent global zone, see Huawei Cloud Stack 8.2.0 Independent
Management Zone Delivery Guide.
Resource pool Optional. The peer Huawei Cloud Stack resource pool
of Cloud is connected to the local resource pool. This resource
Federation pool is required when Cloud Federation with Huawei
with Huawei Cloud Stack is used.
Cloud Stack
Network Nodes
The network node uses the UVP as the host OS. The vRouter, L3NAT, L3_service,
and VPN components are deployed on VMs. Figure 3-6 shows the deployment
details of network nodes.
Gateway endpoint nodes use the UVP as the host OS. FusionSphere OpenStack
(gateway-ep-data role) is deployed on physical servers.
The BMS management node uses the UVP as the host OS. Huawei Distributed
Block Storage is deployed on PMs when being used as the storage for the
BMS management node.
● BMGW node
This node type is optional and is required only when the BMS service is used.
A BMGW node forwards traffic of BMSs. It maps VLANs to VXLANs and
provides Layer 2 and Layer 3 connections, secure access control, and network
address translation (NAT) for BMSs.
BMGW nodes use the UVP as the host OS and are deployed on PMs.
● BMS node
This node type is optional. BMSs are required in scenarios where high
requirements on performance and security are imposed or hardware
interfaces are directly invoked. Similar to KVM compute nodes, you need to
add BMS nodes to the cloud platform before provisioning. Each BMS node can
be provisioned as a BMS instance.
Figure 3-9 shows the deployment details of BMS-related nodes.
Application Backup
The DPA node is required only when the CSBS application backup service is
selected. This node is used to deploy the DPA software.
The DPA node uses EulerOS as the host OS and can be deployed in a single-node
system, a single-node cluster, or a distributed system.
For details, see Data Protection Appliance 8.2.0 User Guide.
NOTE
● When ManageOne manages multiple regions or CSDR is deployed, the NTP service of
FusionSphere OpenStack in all regions synchronizes with a single or multiple external
clock sources. If multiple external clock sources are used, ensure that they use the UTC
time or from the same source.
● Stratum is a hierarchical standard for clock synchronization. It represents precision of a
clock. The value range is from 1 to 16. A smaller value indicates higher precision. The
value 1 indicates the highest clock precision. The value 16 indicates that the clock is not
synchronized. It is recommended that stratum of the external clock source be less than
or equal to 8 to ensure that the clock synchronization between internal NTP
components of Huawei Cloud Stack is normal.
available in the environment and the IP address of the preferred external NTP
server is not configured in the HCC Turnkey deployment parameter file. The
methods to obtain the clock source are described as follows:
● Service OM, Huawei Distributed Block Storage, and ManageOne at the
resource pool layer as well as OM_NTP at the common component layer
obtain clock sources from the NTP service of FusionSphere OpenStack.
● The DMZ_NTP at the common component layer obtains clock sources from
the NTP service of FusionSphere OpenStack.
● Management VMs where cloud services, common components, and
management domain ManageOne reside obtain clock sources from the
OM_NTP at the common component layer.
● Tenant VMs can obtain the clock source from the DMZ_NTP at the common
component layer based on the actual situation.
NOTE
NOTE
When ManageOne manages multiple regions or CSDR is deployed, the NTP service of
FusionSphere OpenStack in the primary region functions as the external clock source. The
NTP services of FusionSphere OpenStack in other regions obtain the clock source from the
primary region.
4 System Security
Challenges
The way to use and manage computing resources in the cloud computing system
has changed, bringing new risks and threats.
Risks and threats for administrators are as follows:
● The virtualization management layer becomes the new high-risk area.
The cloud computing system provides computing resources for a large
number of users through virtualization technologies. Therefore, the
virtualization management layer becomes the new high-risk area.
● It is difficult to track and isolate malicious users.
The on-demand and self-service allocation of resources makes it much easier
for malicious users to launch attacks in the cloud computing system.
● Open interfaces make the cloud computing system vulnerable to external
attacks.
Users access the cloud computing system using open interfaces, making the
cloud computing system vulnerable to external network attacks.
Risks and threats for end users are as follows:
● Uncontrollable risks due to data stored on the cloud
– Compute resources and data are controlled and managed by cloud
computing service providers, which brings risks such as unauthorized
access to user systems by provider administrators.
– Data may not be entirely cleared after the computing resource or storage
space is released.
– The data processing may breach laws and regulations.
● Data leakage and attacks caused by multi-tenant resource sharing
– User data may leak out due to inappropriate isolation methods.
– A user may be attacked by other users within the same physical
environment.
● Security risks caused by open network interfaces
In the cloud computing environment, users operate and manage computing
resources through networks. The open network interfaces bring more security
risks.
Security Architecture
The Huawei Cloud Stack security solution is proposed by Huawei in rise to threats
and challenges posed to the cloud computing platforms. The infrastructure layer
of Huawei Cloud Stack is based on the FusionSphere cloud operating system and
its management system ManageOne. FusionSphere virtualizes physical resources
into virtual resources and forms a virtualization resource pool, including compute
virtualization, storage virtualization, and network virtualization. ManageOne is a
management system of the virtualization platform. It manages different
heterogeneous virtualization platforms, provides operation and O&M for data
centers, and displays resources and management GUIs in a unified manner.
Security Value
● Comprehensive and unified security policies
The centralized management of computing resources makes it easier to
deploy border protection. Comprehensive security management measures,
such as security policies, unified data management, security patch
management, and unexpected event management, can be taken to manage
computing resources. In addition, professional security expert teams can
protect resources and data for users.
5.1 Overview
Introduction
FusionSphere offers cloud operating system (OS) solutions tailored towards a
variety of industries and is designed and optimized for enterprise cloud computing
data center scenarios. It offers powerful virtualization capabilities, resource pool
management functions, comprehensive cloud infrastructure components and tools,
and standard, open application programming interfaces (APIs). It helps enterprise
customers to horizontally consolidate physical and virtual resources in data
centers and vertically optimize service platforms. FusionSphere is suitable for both
traditional and emerging applications, facilitating the build-out, use, and evolution
of cloud computing platforms.
Characteristics
● Openness
FusionSphere is compatible with OpenStack community APIs and provides
self-developed open APIs for cloud services, facilitating interconnection and
integration with third-party products.
● Flexibility
FusionSphere uses a service-oriented architecture (SOA), which allows users
to flexibly add and remove functions based on service requirements.
● High reliability
FusionSphere builds a carrier-class cloud computing platform by employing
the following methods:
– All management services are deployed in active/standby or load sharing
mode to eliminate single points of failure (SPOFs).
– Management data is stored in active/standby mode and is periodically
backed up to ensure data reliability.
– The physical network is divided into multiple logical planes, which are
isolated using virtual local area networks (VLANs), ensuring data
reliability and security during transmission.
Customer Benefits
FusionSphere brings the following benefits to customers:
Component Description
Component Description
6 Cloud Management
6.1 Overview
Definition
ManageOne functions as Cloud Management Platform (CMP). It provides
enterprise customers with unified management of enterprise cloud resources and
public cloud resources leased by enterprises through self-development and
cooperation, including tenant self-service portal, cloud service management and
service catalog, metering, computing, storage, and network resource automation
configuration, O&M monitoring of cloud services and cloud resources, and
operations command analysis.
● Figure 6-1 shows the position of ManageOne in Huawei Cloud Stack.
● Figure 6-2 shows the position of ManageOne in HCS Online.
Feature
ManageOne features multi-level VDC management, one cloud with multiple
resource pools, operations command analysis, public cloud management, cloud
federation with Huawei Cloud Stack management, HCS Online management,
Huawei virtual resource pool management, proactive O&M, cloud service O&M,
unified multi-level cloud O&M, open easy integration, and multi-scale
deployment.
● Multi-level VDC management
A maximum of five levels of VDCs are supported, flexibly matching customer
organization models. ManageOne supports project-based resource
management and flexible mappings among users, projects, and user groups in
an organization, that is, multiple users can manage a project and a user can
manage multiple projects. The upper-layer organization can view the service
instances of each sub-organization. Multi-level VDC management supports
unified agent maintenance and custom roles in the organization, meeting
requirements of customer service permission control. The VDC Self-
Maintenance feature allows customers to perform basic O&M on current-level
and lower-level VDCs, meeting their requirements for self-service O&M.
● Multi-scale deployment
Small-scale, standard-scale, and large-scale management are supported
based on the management scale of different enterprises. Users can create a
VM, initialize a node, upload software packages, deploy databases or services,
configure services, and perform automatic interconnection based on wizards.
After these operations are performed, the software is automatically installed.
Benefits
ManageOne has the following benefits.
● Agile operation
ManageOne is used as a unified operation management platform to improve
operation agility and efficiency. ManageOne provides the following functions:
– Provides unified operation and management of cloud services in multiple
regions to meet the requirements of large enterprises or organizations on
cross-region operation of enterprise clouds.
– Provides a VDC across regions. Manages multi-level VDCs to match the
multi-level organization management model used by large enterprises
and enable the organization at each level to flexibly use cloud resources.
– Provides mechanisms for flexibly allocating resource quotas. Supports
tenant self-service O&M, reducing operation costs.
– Provides various operation roles to meet the permission control
requirements of carriers and enterprises.
– Provides cloud service operation capabilities, including preconfigured
basic IaaS cloud services, ECSs, EVS disks, VPCs, and security groups. In
addition, new cloud services can be introduced by accessing cloud
services.
– Provides powerful O&M automation and automatically orchestrates
services, simplifying the service application provisioning and maintenance
process and greatly improving the operations efficiency.
● Simplified O&M
ManageOne is used as a unified O&M management platform to improve
O&M efficiency. ManageOne provides the following functions:
– Centralized cloud management, ensuring O&M experience consistency
6.2 Architecture
Operations
system
Third-party
application
Category Description
Cloud service Cloud services report resource, alarm, and performance data
of instances to OperationCenter and report data, such as the
subscription and metering data, to ServiceCenter.
Northboun These APIs are used for carrier and enterprise RESTful
d APIs network monitoring and O&M, integration with
the existing OSS and BSS, and carrier and
enterprise service innovation as well as rapid
rollout.
For details about northbound APIs, see
ManageOne 8.3.0 API Reference.
Node Description
Node Description
6.4 ServiceCenter
6.4.1 Introduction
Challenges for Customers to Use Cloud
NOTE
The resource pools shown in the preceding figure are only examples.
NOTE
Currently, Service Builder is used only in the Huawei Cloud Stack scenario.
Quota A quota for a resource type specifies the maximum number of this
type of resources that can be used. It can be set to a specific
number or Unlimited (the remaining quota of the same resource
type in the whole ManageOne system or an upper-level VDC).
User Users in a user group inherit all permissions assigned to the user
group group. After the user group is associated with resource spaces, the
users have permissions on the resource spaces. This makes
authorization easy.
– Multi-level VDCs form a tree structure in which the first-level VDC serves
as the root. Based on rights- and domain-based management at different
VDC levels, you can manage users and resources in your own VDCs and
all lower-level VDCs by default.
– A tenant can contain a maximum of five levels of VDCs. You can create
multiple VDCs at each VDC level (except the first level).
– If you want to delegate a third party to manage operations, create an
agent administrator to manage one or more tenants. You can create,
delete, and modify agent administrators. Agent administrators, in place
of VDC administrators, can manage multiple first-level VDCs on which
they have agent maintenance permissions and manage users and
resources in the VDCs.
Benefits
● The VDC tenant model flexibly matches the organizational model of an
enterprise.
● Configuring quotas by quota unit matches the way how enterprises use their
budgets.
● User groups, resource spaces, and policies facilitate permissions management.
Operation Administrators
Table 6-8 lists all permissions and responsibilities of operation administrators.
Obje Permission
ct
Repo Metering reports: View, export, subscribe to, and customize metering
rt reports.
Metering units: View and manage metering units.
Quota statistics: View quota statistics.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 100
Huawei Cloud Stack
Solution Description 6 Cloud Management
Repor Metering reports: View, export, subscribe to, and customize metering
t reports.
Metering units: View and manage metering units.
Quota statistics: View quota statistics.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 101
Huawei Cloud Stack
Solution Description 6 Cloud Management
Objec Permission
t
Agent Administrators
An agent administrator can perform agent maintenance operations on first-level
VDCs for which the agent administrator has agent maintenance permissions. The
permissions of an agent administrator are similar to those of a first-level VDC
administrator.
Table 6-10 Permissions and responsibilities of the VDC operator user group
Object Permission
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 102
Huawei Cloud Stack
Solution Description 6 Cloud Management
Object Permission
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 103
Huawei Cloud Stack
Solution Description 6 Cloud Management
Object Permission
Report Metering reports: View, export, subscribe to, and customize metering
reports.
Metering units: View metering units.
Quota statistics: View quota statistics.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 104
Huawei Cloud Stack
Solution Description 6 Cloud Management
Unified Operations
This scenario applies to small companies that do not have departments. During
resource allocation, all virtual resources are allocated to one first-level VDC for
unified management. In this scenario, tenant administrators serve as global
administrators.
Multi-Level Operations
A multinational carrier or trans-provincial company has multiple provincial
companies or subsidiaries (tenants), and each provincial company or subsidiary
includes multiple departments (lower-level VDCs). During resource allocation,
resources required by a lower-level department can be allocated to a lower-level
VDC. Currently, a maximum of five levels of VDCs can be created.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 105
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
NOTE
● An agent administrator creates VDCs based on the organizational structure and sets
resource quotas for each VDC.
● An agent administrator can switch to different VDCs to apply for resources, and notify
end users of resource information offline.
● End users who use resources do not need to log in to ManageOne.
● Resources requested by agent administrators during agent maintenance in a VDC
occupy resource quotas of the VDC.
Benefits
A wide range of secure, stable services are preset with custom parameters to meet
diverse customer needs.
Table 6-13 lists services that can be created.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 106
Huawei Cloud Stack
Solution Description 6 Cloud Management
Portal for Tenants in B2B scenarios) as a tenant user. Click in the upper left
corner, select a region and resource space, and choose Service List. Select a
service based on the service category to access the service request and
management page.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 107
Huawei Cloud Stack
Solution Description 6 Cloud Management
Definition
Backed by open service APIs, O&M automation capabilities, and the enterprise
process adaptation engine, Service Builder provides a unified process and a robust
ecosystem for provisioning IT capabilities as services and allows you to quickly
apply for, provision, configure, and deploy IT resources and capabilities online.
Functions
Service Builder provides the following functions:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 108
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 109
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 110
Huawei Cloud Stack
Solution Description 6 Cloud Management
Constraints
● Currently, Service Builder is used only in the Huawei Cloud Stack scenario.
● Before creating, importing, or modifying a service template, creating,
importing, modifying, assigning a component, or using functions related to
service API providers, ensure that the ServiceCenter advanced-edition license
has been imported and resource pools have been updated. For details about
how to update resource pools, see section "Virtual Resource Pool Monitoring"
> "Components" in ManageOne 8.3.0 O&M Guide.
NOTE
The ServiceCenter advanced edition license has the following two modes:
● Product license: ServiceCenter Advanced Edition License (per CPU)
For more information about license-related operations, see ManageOne 8.3.0
License Guide.
● Cloud service permission mode: Hybrid Cloud CMP Service for HCS M1-Service
Center Advanced-per Suite-Yearly or Hybrid Cloud CMP Service for HCS-Service
Center Advanced-per Suite-Yearly
● In ManageOne 8.0.1 and later versions, the OS::Heat::WaitCondition and
OS::Heat::WaitConditionHandle resources are not supported.
● In ManageOne 8.0.3 and later versions, vAPP is renamed Service Builder.
6.4.5.3.2 Benefits
Service Builder can help government and enterprise customers quickly provision
their IT capabilities as services. Service Builder has the following benefits:
● Redefines cloud services as required.
Service Builder redefines the cloud service provisioning process to take your
experience to the next level. It combines cloud services at your fingertips with
your approval processes and standardizes the cloud service request process.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 111
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 112
Huawei Cloud Stack
Solution Description 6 Cloud Management
requested resources with one click so that you can deploy basic resources and
software in batches and quickly release resources. If you need to set up
multiple environments with the same basic resources or complex service
applications, you can abstract the environment scenarios, quickly create a
service template in the graphical designer, and use the template to create
services to apply for multiple resources in batches.
● Matching government and enterprise processes
You can combine the services built by Service Builder with the enterprise
organization approval process to standardize the request process and quickly
suit government and enterprise needs.
● Cross-cloud orchestration
In the IT service management scenario, Service Builder is used to orchestrate
multiple resource pools or multi-cloud resources based on the service
requirements of each department. For example, Service Builder can be used
for cross-cloud orchestration in the scenario where services are deployed on
the public cloud to quickly respond to customer requests, and databases are
deployed on the enterprise cloud to ensure data security and reliability.
● Orchestration for legacy IT capabilities
Orchestrate your legacy IT capabilities into new cloud services and add your
new cloud services to the service catalog and cloud service marketplace. Boost
IT resource sharing to cultivate a robust IT service ecosystem. In addition,
offline tasks can be delivered, and offline resources can be provisioned.
6.4.5.3.4 Architecture
Service Builder matches cloud-native services with government and enterprise IT
requesting processes to standardize the requesting process, and allows for
orchestration across regions, resource pools, and clouds. In addition, it provides the
page design and process orchestration capabilities to orchestrate your legacy IT
capabilities into new cloud services, which boosts IT resource sharing to cultivate a
robust IT service ecosystem. Figure 6-20 shows the overall architecture of Service
Builder.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 113
Huawei Cloud Stack
Solution Description 6 Cloud Management
Figure 6-21 Relationships between Service Builder and other cloud services
Table 6-20 Relationship between Service Builder and other cloud services
ECS Service Builder uses the ECS service to create ECSs, and
manage and maintain the created ECSs.
BMS Service Builder uses the BMS service to create BMSs, and
manage and maintain the created BMSs.
VPC The VPC service provides subnets and security groups for
Service Builder to create ECSs or BMSs.
EVS Service Builder uses the EVS service to create EVS disks for
ECSs or BMSs, and manage and maintain the created EVS
disks.
IMS Before using Service Builder to create an ECS or a BMS, use the
IMS service to create an image required by the ECS or BMS
first. If scripts in Service Builder need to obtain software from
images and install the software on ECSs or BMSs, software
must be installed in the images.
CCE Service Builder uses the CCE service to create, manage, and
maintain CCE resources such as clusters, node pools,
namespaces, and containers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 114
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.4.5.4.1 Introduction
Definition
An approval process is a business process that an enterprise uses to approve
operations, such as requesting and recycling resources, before they are completed.
ManageOne allows you to create tailored, digitized approval processes to improve
compliance, maximize resource utilization, and prevent misoperations. You can
choose either of the following approval process types:
● Simplified: Create a simple approval process with up to five approval levels.
● Graphical: Drag and drop graphical elements to orchestrate a custom
approval process that supports more levels and accommodates more
scenarios.
You can also connect ManageOne to external systems and use processes already
configured for those external systems.
Benefits
● Quick and simple approval process design
To create a simplified approval process, you just need to enter a name and
specify the number of approval levels and approvers.
To create a graphical approval process, you can drag and drop graphical
elements used as phases in your approval process, specify process flow
conditions, and set parameters for each phase.
● Support for complex approval processes
If you need to configure a more complex approval process where one phase
may have multiple branches, you can add fields and set conditions to create a
graphical approval process.
● Support for group approvals
The graphical approval process offers the group approval mode. It lets you
select a group of users to approve a single request and specify approval
conditions. The final approval disposition depends on the approval actions
taken by all the selected users and whether the approval conditions are met.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 115
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.4.5.5.1 Introduction
Definition
ManageOne uses quotas to control the number of resources that can be used by
departments within their budgets.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 116
Huawei Cloud Stack
Solution Description 6 Cloud Management
Quotas can be used for budgeting and accounting on cloud service resources.
Benefits
● Multi-dimensional budget control
You can control budgets for more than 50 cloud services.
You can configure four different aspects of your budgets: region, resource
pool, AZ, and SLA.
● Accounting analysis for quotas
Administrators can query how many resources are used and check whether
quotas (budgets) are sufficient in real time.
Administrators can query and analyze system resources and quotas in
corresponding reports in real time. To facilitate accounting assessment, they
can view the top 10 quota units by quota, used amount, and remaining
amount.
Budgeting
There are the following typical budgeting scenarios:
● Budgeting of cloud service instances
If enterprises are concerned with how many cloud service instances they use,
they can create a budget for how many cloud service instances are needed
based on the number of people involved in a quota unit. In the budget
example in the following table, the estimated ratio of the headcount to the
number of ECS instances is 1:1.2, ensuring that each person has one ECS and
there are reserves equal to 20% of the headcount.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 117
Huawei Cloud Stack
Solution Description 6 Cloud Management
Accounting
You can analyze the difference between the number of cloud service instances
actually used and what was budgeted for quota unit accounting. If there is a big
difference, the resource budget needs to be adjusted.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 118
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.4.5.6.1 Introduction
Definition
Metering and Pricing collects usage statistics and tracks expenditures for each
department in an enterprise. The IT department can then review monthly,
quarterly, and yearly metering reports and check the resource usage of each
department against their budget.
NOTE
Expenditure statistics are for your reference only. They are not used as the basis for billing.
Functions
● Service pricing
You can set pricing for each service flavor. For example, if the price for an ECS
with 1 vCPU and 2 GB memory is 3 yuan per hour, the total cost for using the
ECS will be this price times hours used (based on the metering data).
● Account management
You can top up accounts each of which correspond to one VDC. If a service is
priced and fee deduction is enabled for the service, the system deducts fees
based on the quantity of used resources in the service. If the balance of an
account is insufficient, the account cannot be used to apply for resources.
● Metering reports
You can view metering results of each VDC in reports. There are different
types of reports, including Cloud Resource Details, Cloud Resource Monthly
Report, Cloud Service Statistics, Tenant Statistics, Account Report, Huawei
Cloud Bill, and Custom Report. You can select required types of reports to
view metering data of cloud service resources.
● Metering views
A metering view displays metering data of all cloud service resources in VDCs
of a single tenant.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 119
Huawei Cloud Stack
Solution Description 6 Cloud Management
Benefits
● Services can be priced.
● Resource usage of tenants can be metered and priced for easy business and
fee settlement.
● Detailed metering data of each VDC in a tenant is provided to facilitate
operations analysis.
6.4.5.7.1 Introduction
Definition
After you create services required by a business system, you can create an
application to manage provisioned resources, divide the business system into
multiple modules, and use the UI to install and manage software. In addition,
ManageOne provides application-based monitoring and alarm views to facilitate
resource management.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 120
Huawei Cloud Stack
Solution Description 6 Cloud Management
Features
● Easy to build
The UI makes it easy to create diverse applications on demand. For instance,
you can use the UI to configure application details, add resources, and create
modules and deployment tasks.
● Easy to deploy
You can use graphically designed deployment processes to install, upgrade,
and maintain application software.
● Easy to manage
You can view application topologies and all-round application monitoring
data, perform UI-based operations to manage applications, resources,
modules, deployments, users, and alarms, as well as start and stop resources
and manage processes in one click.
Benefits
● The application-centric design makes maintenance and management more
efficient.
– IT administrators can spend more time on guaranteeing the quality of
applications without being tethered to complex and repeated resource
configuration tasks, such as resource creation and adjustment.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 121
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 122
Huawei Cloud Stack
Solution Description 6 Cloud Management
Application Scenario
Leverage Application Management to quickly build a web application consisting of
the web middleware, application server, and database modules, create and
execute deployments in the modules, and manage module processes. Then, the
system comprehensively monitors and displays the status, topology, and alarms of
the application, helping you identify and troubleshoot faults faster.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 123
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 124
Huawei Cloud Stack
Solution Description 6 Cloud Management
Definition
Unified Resource Management is a resource center provided by the system for
tenants. Users can quickly manage resources requested on the cloud platform
using the resource center and view resources in multiple dimensions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 125
Huawei Cloud Stack
Solution Description 6 Cloud Management
Functions
● Users can view resources in multiple dimensions.
● The resource list can be exported.
● The cloud service console can be accessed.
Benefits
● A unified resource view is provided to improve resource management
efficiency.
● Users can view resources in multiple dimensions to meet various resource
statistics requirements.
Scenarios
● On the resource center of ManageOne Operation Portal for Admins, you can
view resources in all resource spaces.
● On the resource center of ManageOne Operation Portal for Tenants, you can
view and manage resources in all resource spaces of the VDC.
6.5 OperationCenter
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 126
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 127
Huawei Cloud Stack
Solution Description 6 Cloud Management
Custom user If the preset user groups provided by the system cannot meet
group the authorization requirements in the authorization plan,
customize user groups and assign operation permissions to
them. In this way, you can centrally assign and manage user
permissions.
6.5.2 Monitor
6.5.2.1 Overview
NOTE
Data Set
A data set consisting of multiple dimensions and indicators is an application-
oriented unified data model provided by MODataNebula. It can be regarded as a
container of indicators.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 128
Huawei Cloud Stack
Solution Description 6 Cloud Management
Dimension
A dimension is an aspect from which people observe the objective world, and is a
high-level type division. When analyzing data, go from general to specific, from
macroscopic to microscopic, from global to partial, and from overall to detail.
Associations are established among multiple dimensions to provide clues for
analysis.
● A dimension includes hierarchies. Dimensions in the same dimension group
can be drilled up and down.
● Dimensions can be independent from each other, or combined together to
form a hierarchy from general to specific, for example, from year, to month, to
day, or from region, to AZ, to cluster.
Indicator
Specific indicator of centralized data storage. Generally, the indicator value is a
number that changes over time. For example, the CPU usage of an ECS instance is
an indicator provided by Huawei Cloud ECS. This indicator is based on raw data
aggregation and supports multiple aggregation modes, such as Avg, Max, Sum,
and Count.
Canvas
Canvas, also called interface editor, is the most important functional area for
customizing overviews. The canvas is used for page layout, chart style, and
preview of overviews.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 129
Huawei Cloud Stack
Solution Description 6 Cloud Management
Element
You can select elements from the element area and add them to the canvas.
Currently, the following two elements are supported:
● Preset Business Cards
● Custom Graphs
6.5.2.1.2 Benefits
● Preset Common Monitoring and Workspace Overview
Preset Common Monitoring for typical scenarios and Workspace Overview
can meet basic monitoring requirements of routine O&M.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 130
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.1.3 Functions
Overview enables O&M personnel to view preset Common Monitoring, Workspace
Overview, customize and manage an overview.
Function Description
● Custom overview
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 131
Huawei Cloud Stack
Solution Description 6 Cloud Management
Figure 6-31 shows the custom overview WebUI, where you can understand
each functional module when you customize an overview for the first time.
Area Description
4. Other
● Click to save the custom overview.
operations
● Click to exit the custom overview.
6.5.2.1.4 Scenarios
Overview is mainly used for routine monitoring to help O&M personnel centrally
monitor statistics on capacities, alarms, resources, and applications as well as
resource health.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 132
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.1.6 Constraints
After ManageOne is interconnected with Workspace, Workspace Overview can be
viewed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 133
Huawei Cloud Stack
Solution Description 6 Cloud Management
alarm monitoring and handling rules and notifies O&M personnel of faults. This
facilitates efficient alarm monitoring and quick fault locating, ensuring smooth
service running.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 134
Huawei Cloud Stack
Solution Description 6 Cloud Management
Alarm Severity
The alarm severity indicates the severity, importance, and urgency of a fault. It
helps O&M personnel quickly identify the importance of an alarm, take
corresponding handling policies, and change the severity of an alarm as required.
Table 6-30 lists the alarm severities.
Alarm Status
Table 6-31 lists the alarm statuses.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 135
Huawei Cloud Stack
Solution Description 6 Cloud Management
Clearanc Cleared and The initial clearance status is Uncleared. After a fault
e status uncleared that causes an alarm is rectified and the
corresponding clearance notification is automatically
reported to alarm management, the clearance status
of the alarm is changed to Cleared. For some alarms,
clearance notifications cannot be automatically
reported. You need to manually clear these alarms
after corresponding faults are rectified. The
background color of cleared alarms is green.
Validity Valid and ● Valid alarm: The initial validity status of an alarm
invalid is valid.
● Invalid alarm: Alarms that O&M personnel
determine as invalid alarms based on experience.
You can configure identification rules to set the
alarms as invalid alarms. You can also set the
status of this type of alarms to invalid. When
monitoring or querying alarms, you can set filter
criteria to filter out invalid alarms.
Event Status
Table 6-32 lists the event statuses.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 136
Huawei Cloud Stack
Solution Description 6 Cloud Management
Name Description
Type Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 137
Huawei Cloud Stack
Solution Description 6 Cloud Management
Type Description
Operation alarm Alarms generated when the required services cannot run
properly due to problems such as service unavailability,
faults, or incorrect invocation. For example, alarms caused
by service rejection, service exit, and procedural errors.
File transfer status Alarms or events reported when the file transfer succeeds
or fails.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 138
Huawei Cloud Stack
Solution Description 6 Cloud Management
Type Description
6.5.2.2.2 Benefits
Alarms on ManageOne Maintenance Portal centrally monitors alarms reported by
system services or third-party systems, facilitating quick fault locating and
rectification and ensuring smooth service running. Alarms is dedicated to full-stack
alarm monitoring of data centers. It provides abundant monitoring and processing
rules to monitor and manage alarms or events reported by the system or
managed objects, helping O&M personnel efficiently monitor services and systems
and improve O&M efficiency.
● Centralized monitoring
– Centralized alarm monitoring on the unified monitoring pages: Alarms is
able to collect cross-domain and cross-vendor data. It collects NE alarms
from element management systems (EMSs) and displays the alarms on
the monitoring pages.
– Centralized monitoring: Flexible and real-time alarm reporting interfaces
are provided to report alarms to the upper-layer network management
system (NMS).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 139
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Precise monitoring
Flexible alarm rule configuration: Massive amounts of alarms can be
associated and compressed, reducing alarm noises and improving monitoring
precision.
● Diversified monitoring
Efficient monitoring: O&M personnel can use diversified alarm filtering
methods to quickly filter concerned alarms.
● Personalized monitoring
Users can customize the colors and sounds of alarms and events and alarm
content colors to meet requirements in different scenarios.
6.5.2.2.3 Scenarios
This topic describes the alarm management operations performed in different
O&M scenarios. You can execute O&M tasks based on the site requirements.
Figure 6-36 shows the alarm management panorama.
6.5.2.2.4 Function
Alarms provides various alarm monitoring and handling rules. By setting these
rules, you can reduce the number of alarms and implement real-time alarm
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 140
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 141
Huawei Cloud Stack
Solution Description 6 Cloud Management
Configuring Alarms provides visualized pages for managing alarm rules and
Alarms or settings. In the remote DR scenario, alarm rules are
Events synchronized between the primary and secondary sites every
hour. After a DR switchover, the synchronization of all alarm
rules is complete within 5 minutes.
● Masking Rules
Users do not need to handle the alarms or events generated
during maintenance, testing, or deployment of the system or
managed objects. To hide these alarms and events from the
Current Alarms, Historical Alarms, or Event Logs page,
users can configure masking rules. When configuring
masking rules, they can choose to discard the masked
alarms and events (rather than save the alarms and events
in the alarm database) or display the masked alarms on the
Masked Alarms page.
● Identification Rules
After a status identification rule is set, the system
automatically sets a status identifier for the alarms that
match the rule. For example, O&M personnel can set alarms
that are generated during commissioning to Maintenance
when they maintain devices. They can then set filter criteria
to filter out these alarms to improve alarm handling
efficiency.
● Severity and Type Redefinition
To ensure smooth running of network devices or key devices
in a certain region, users can configure redefinition rules to
adjust alarm or event severity and types. For example, if an
alarm is considered important, it can be set to a higher-
severity alarm. O&M personnel can then handle it first to
provide high-quality network assurance services.
● Name Redefinition
Some alarm or event names are technical and difficult to
understand. Users can redefine alarm or event names as
required.
● Alarm Correlation Rules
A correlation rule defines correlative relationships between
alarms. Correlated alarms are the alarms whose causes are
related. Among correlated alarms, one alarm is the root
cause of the others. You can customize correlation rules, and
enable and disable default correlation rules as required.
When monitoring or viewing alarms, you can filter out
correlative alarms and focus only on the root alarms.
● Intermittent/Toggling Rules
When the interval between alarm generation and alarm
clearance is less than a specific period, the alarm is
considered as an intermittent alarm.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 142
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Remote With this function, Alarms can send alarms or events to users in
Alarm real time through SMS messages or emails. In this way, users
Notification can learn the alarm or event information in real time during
off-work hours and handle important alarms or events in time.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 143
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Table 6-36 lists the methods for monitoring alarms or events and handling
alarms.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 144
Huawei Cloud Stack
Solution Description 6 Cloud Management
Monitoring and O&M personnel can monitor and view alarms or events in
Viewing Alarms Alarms in real time to learn about the alarms or events on
or Events the system in real time and take corresponding measures.
● Alarm or event list
– A current-alarm list is provided, and alarms can be
pushed to the Current Alarms page. O&M personnel
can monitor and handle the alarms in this list in real
time. Alarms are stored in the database after being
reported. The maximum number of current alarms that
can be stored in the database can be 20,000, 50,000,
100,000, 200,000, 300,000, 500,000, or 1,000,000.
During system installation and deployment, 20,000
alarms are displayed by default. You are advised not to
change the maximum number.
– Alarms provides an alarm log list for O&M personnel to
view the current and historical alarms. By default, the
list contains 20,000 current and historical alarms.
– Alarms provides an event log list for O&M personnel to
view the event messages sent from devices. By default,
the list contains 20,000 events.
● Alarm statistics panel
On the Current Alarms page, the statistics panel is
provided to display the following statistics:
– Top 10 Alarms: Collects statistics on the most frequent
alarms.
– Duration: Collects statistics on the number of current
alarms by duration.
– Top 10 Alarm Sources: Collects statistics on the alarm
sources with the largest number of current alarms.
– Severity: Collects statistics on the total number of
current alarms and the number of current alarms at
each alarm severity.
– Status: Collects statistics on the number of alarms by
acknowledgement and clearance status.
● Alarm or event name groups
You can add multiple alarm or event names to a name
group so that you can perform operations on them at a
time.
● Alarm sound and indicator
When a new alarm is reported, Alarms plays a sound. The
alarm indicator that corresponds to the severity of the
alarm starts to flash to remind you to handle alarms in a
timely manner.
● Filtering
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 145
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Table 6-37 lists the routine maintenance functions such as alarm data
management.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 146
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 147
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 148
Huawei Cloud Stack
Solution Description 6 Cloud Management
Mechanism Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 149
Huawei Cloud Stack
Solution Description 6 Cloud Management
Mechanism Description
Alarm dump To avoid excessive alarm database data, the system dumps
rule events, masked alarms, and historical alarms every 2 minutes
according to the following rules. The dumped alarms or events
cannot be queried in the alarm or event list.
● If the database space usage reaches 80%, alarm
management dumps the data in the database to files
according to the sequence of occurrence time and data
table type (event, masked alarm, or historical alarm). When
the space usage after dumping reaches 80% of the usage
before dumping, the dumping is stopped.
● If alarm management detects that the data in the database
table is generated 90 days ago, it dumps the database
table.
Dumped files that meet any of the following rules will be
deleted:
● The dumped file will be deleted after 180 days.
● If the total size of the dumped files exceeds 1 GB or the
total number of files exceeds 1000, the system deletes the
earliest files.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 150
Huawei Cloud Stack
Solution Description 6 Cloud Management
Alarm masking Alarm management discards the alarms that meet the
masking rules, that is, the alarms are not archived to the
database, or records the alarms in the masked alarm data
table.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 151
Huawei Cloud Stack
Solution Description 6 Cloud Management
Operation Description
Severity and type Alarm management redefines the alarms that meet the
redefinition severity and type redefinition rules.
Alarm merging Alarm management merges the alarms that meet the
merging conditions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 152
Huawei Cloud Stack
Solution Description 6 Cloud Management
Event masking Alarm management discards the events that meet the
masking rules (that is, the alarms are not archived to the
database).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 153
Huawei Cloud Stack
Solution Description 6 Cloud Management
Operation Description
Setting events as Alarm management converts events that meet the rules for
ADMC alarms setting events as ADMC alarms into alarms and handles the
alarms based on the alarm handling process. Events that do
not meet the rules are handled based on the event handling
process.
Severity and type Alarm management redefines the events that meet the
redefinition severity and type redefinition rules.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 154
Huawei Cloud Stack
Solution Description 6 Cloud Management
Data Set
A data set consisting of multiple dimensions and indicators is an application-
oriented unified data model provided by MODataNebula. It can be regarded as a
container of indicators.
A data set performs the following functions:
● Shields the implementation at the bottom layer for users.
● Combines different application scenarios as needed.
● Customizes dimensions or indicators.
● Defines information visible to users (for example, internationalization and
data display format).
Dimension
A dimension is an aspect from which people observe the objective world, and is a
high-level type division. When analyzing data, go from general to specific, from
macroscopic to microscopic, from global to partial, and from overall to detail.
Associations are established among multiple dimensions to provide clues for
analysis.
● A dimension includes hierarchies. Dimensions in the same dimension group
can be drilled up and down.
● Dimensions can be independent from each other, or combined together to
form a hierarchy from general to specific, for example, from year, to month, to
day, or from region, to AZ, to cluster.
Indicator
Specific indicator of centralized data storage. Generally, the indicator value is a
number that changes over time. For example, the CPU usage of an ECS instance is
an indicator provided by Huawei Cloud ECS. This indicator is based on raw data
aggregation and supports multiple aggregation modes, such as Avg, Max, Sum,
and Count.
Canvas
The canvas, also called the interface editor, is the most important functional area
for customizing a dashboard. The canvas can be used to implement page layout
and color matching, layout of charts and tables, and visualized preview of
dashboards.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 155
Huawei Cloud Stack
Solution Description 6 Cloud Management
Element
You can select elements from the element area and add them to the canvas.
Currently, Dashboard supports the following elements:
● Template
● Chart
● Topology
● Auxiliary
● Icon
6.5.2.3.2 Benefits
● Preset dashboards for typical scenarios, covering all O&M scenarios
The system presets templates of common indicators and dashboards in typical
scenarios. You can also customize dashboards. In this case, all O&M scenarios
are included.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 156
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 157
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.3.3 Functions
Dashboards are provided for typical service scenarios and support flexible
customization and full screen display.
● Preset dashboards for typical service scenarios
● Custom dashboards
If preset dashboards cannot meet the requirements of administrators for
centralized monitoring and demonstration, administrators can customize
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 158
Huawei Cloud Stack
Solution Description 6 Cloud Management
another one. Table 6-42 describes the basic structure of the custom
dashboard GUI.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 159
Huawei Cloud Stack
Solution Description 6 Cloud Management
Region Description
Pin on top
Pin to bottom
Delete
Align top
Align bottom
Align left
Align right
Distribute horizontally
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 160
Huawei Cloud Stack
Solution Description 6 Cloud Management
Distribute vertically
Cancel
Restore
Preview
Save
Save as
Close
Help
● Dashboard presentation
Move the cursor to the target dashboard card and click it to go to the full
screen demonstration page. Press F11 to enter or exit full screen mode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 161
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Dashboard management
– You can edit, delete, preview, copy, combine, import, and export
dashboards, move a dashboard to another type, and add a dashboard to
favorites.
– You can remove a dashboard from the Overview page and adjust the
sequence of dashboards on the Overview page.
6.5.2.3.4 Scenarios
Dashboard monitors the overall running status and health status of a data center
in a centralized manner. When demonstration and reporting are required in O&M
centers or exhibition halls, you can switch to full screen mode in one click. Visual
services and O&M assist in decision-making and make online services and O&M
management more efficient.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 162
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Routine O&M
During routine maintenance, you can use Dashboard to monitor data in the
data center in real time.
● Full-screen monitoring
When the running status of a data center in the O&M center or exhibition
hall needs to be displayed, you can switch to the dashboard demonstration
mode on the homepage to facilitate centralized monitoring, demonstration,
or reporting.
Architectur Description
e Element
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 163
Huawei Cloud Stack
Solution Description 6 Cloud Management
Architectur Description
e Element
Data set Divides data obtained from the Elasticsearch server into different
data sets based on data types, including alarms, performance,
capacity, resources, and services.
Chart Provides various chart elements. You can configure element data
and layout by selecting data sets.
Dashboard You can select different chart elements and drag them to form a
complete dashboard. Dashboards include preset and custom
dashboards.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 164
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Health analysis: O&M personnel can view the health and busyness of different
resources and metrics to learn the health status of resources and timely
handle exceptions.
● Risk prediction: Time series data with multiple features is used to predict
service data such as performance and latency. Such data helps O&M
personnel identify resource capacity bottlenecks and accordingly scale out
resources in a timely manner to ensure service continuity.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 165
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 166
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.4.2 Benefits
Resource Monitoring helps O&M personnel timely troubleshoot and provides
abundant monitoring information and O&M functions, reducing the labor and
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 167
Huawei Cloud Stack
Solution Description 6 Cloud Management
time costs of analyzing the underlying service topology, locating root causes, and
maintaining resources.
● Comprehensive analysis
– Layered topology
The layered service topology clearly displays the statuses of resources at
each layer, helping O&M personnel quickly demarcate responsibilities in
case of a fault.
– Performance analysis
The performance data of resources is displayed graphically, so that you
can quickly obtain the performance trend data of resources in different
time segments and quickly detect performance anomalies. In addition,
historical performance data can be quickly exported for offline query.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 168
Huawei Cloud Stack
Solution Description 6 Cloud Management
– Alarm statistics
Alarm statistics are displayed in diverse modes, such as alarm list, alarm
ring chart, and alarm trend chart, helping O&M personnel quickly filter
alarms related to each resource and improving monitoring efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 169
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 170
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.4.3 Functions
Resource Monitoring provides the monitoring list and details for different
resources.
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 171
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 172
Huawei Cloud Stack
Solution Description 6 Cloud Management
Alarm Displays alarm data reported by cloud services, alarm details, and
s allows you to redirect to the alarm help in one-click mode.
Capac Displays the allocation rate, usage, and resource allocation details
ity of cloud services.
Analy
sis
Run Centrally collects run log data of cloud services. O&M personnel
Logs can create a custom template or use a preset template to
download run logs of the management plane. Alternatively, they
can select a cloud service management VM from node logs to
download logs, timely analyze log information, and locate the
fault.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 173
Huawei Cloud Stack
Solution Description 6 Cloud Management
Funct Description
ion
Integr On the integration gateway console, you can view the API route
ation list, enable or disable global flow control, and set parameters for a
Gatew specific API.
ays
Function Description
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 174
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Run Logs Run log data collection, data plane run log download,
log analysis, and exception locating
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 175
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 176
Huawei Cloud Stack
Solution Description 6 Cloud Management
Associating big data Big data applications are associated with different
applications with tags based on O&M scenario requirements so that
tags tenant big data asset information can be monitored
by tag, increasing administrator productivity.
6.5.2.4.4 Scenarios
Resource Monitoring can be used in routine monitoring and fault troubleshooting.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 177
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Routine monitoring
View the running, monitoring, and alarm statuses of resources to stay
informed of the resource health.
● Troubleshooting
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 178
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 179
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 180
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 181
Huawei Cloud Stack
Solution Description 6 Cloud Management
Table 6-52 describes the logical architecture of big data application monitoring.
Category Description
Reporting The Elasticsearch server reports the usage of big data assets to
data big data applications in a timely manner and continuously
monitors the data assets of each service.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 182
Huawei Cloud Stack
Solution Description 6 Cloud Management
Category Description
Providing Resource Tag provides tags for big data applications so that
tags administrators can associate user data with tags on the Big Data
Applications page and then monitor tenant big data assets by
tag.
NOTE
Elasticsearch is a search server that provides the data storage, query, and computing
capabilities.
6.5.2.4.6 Constraints
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 183
Huawei Cloud Stack
Solution Description 6 Cloud Management
in different VPCs). In VPCL2 and VPCL3 scenarios, there are only about
five switches between VMs. In VPC Peering, there are vRouters and about
five switches between VMs.
– You can perform a resource connection probe to test the connection
between VMs or between containers within a given region.
– Only Huawei Cloud Stack scenarios are supported.
● URL test (tenant plane)
– Currently, a URL test can only be performed on applications. URL test
tasks have to be matched to specific applications.
– Only Huawei Cloud Stack scenarios are supported.
– In KVM, URL tests are supported by default. In FusionCompute, the
network is disconnected by default, but a customer can configure the
network for URL tests if necessary.
– During a URL test, the AutoOps capability channel is shared, so the OS
type supported by the test point depends on the OS type supported by
AutoOps.
– Up to 500 URL test tasks can be executed at once. Up to 5 tasks can be
executed for each tenant application, and up to 200 tasks can be
executed for a test point.
● In the one-level operations and two-level maintenance scenario, applications
provisioned on ManageOne Operation Portal can be monitored on
ManageOne Maintenance Portal.
– If all of the nodes of an application belong to the resource pool of a
specific branch, the application is pushed to that branch's ManageOne
Maintenance Portal for monitoring. In addition, the capabilities of this
application on ManageOne Maintenance Portal of the HQ is limited.
– If the nodes of an application are deployed across multiple branches (the
HQ is considered to be a branch), the application only is monitored only
on the HQ ManageOne Maintenance Portal. In addition, health and
busyness evaluations are not supported, but the idleness analysis and
bottleneck analysis of resources at the HQ node are supported.
● In the one-level operations and two-level maintenance scenario, applications
customized on a specific ManageOne Maintenance Portal can only be
monitored on that portal.
● Faulty Host Location
You can create another task only after tasks for locating abnormal hosts of
cloud services or applications are executed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 184
Huawei Cloud Stack
Solution Description 6 Cloud Management
– Currently, a URL test is only supported for resources associated with the
cloud service management plane, and the tasks have to be matched to
specific cloud services.
– No more than 500 tasks for each service are supported, the initiation
point must be specified, and there can be no more than 200 tasks on a
single node.
– The interval between tasks is 10 ms. On a VM with 2 vCPUs and 2 GB
memory, the CPU usage is about 10%, and memory consumption is
negligible.
● Faulty Host Location
You can create another task only after tasks for locating abnormal hosts of
cloud services or applications are executed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 185
Huawei Cloud Stack
Solution Description 6 Cloud Management
Collection Tasks
After preset or custom collection tasks are started, performance metrics of
resources can be monitored. You can check whether monitoring tasks and
monitoring metric collection state of each resource are normal.
● Performance metric
Metrics such as CPU usage and memory usage reflect resource performance.
If an exception occurs, for example, the monitored performance metric
exceeds the threshold, an alarm is generated and sent to O&M personnel for
adjustment.
● Metric threshold
A metric threshold is used to configure whether to report alarms and alarm
severity. When the data of a performance metric exceeds the preset threshold,
an alarm is generated. When the metric data falls down to the allowed range,
the alarm is automatically cleared.
● Resource
Resources refer to those in a DC, such as physical servers and ECSs.
● Repetitions
Repetitions specify number of consecutive times that metrics reach the
thresholds for reporting and clearing a notification. For example, if this field is
set to 3, a notification is reported when the collected performance metric
value reaches the threshold for three consecutive times, and the notification is
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 186
Huawei Cloud Stack
Solution Description 6 Cloud Management
cleared when the collected performance metric value is lower than the
threshold for three consecutive times.
Agent Management
Install the Agent on an ECS or physical server to collect in-band performance
metrics of the ECS or physical server. and monitor the Agent status. If the Agent
version is outdated, upgrade the Agent.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 187
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.5.2 Benefits
After preset and custom collection tasks are started, performance metrics can be
monitored during routine O&M. Custom performance alarm thresholds allow you
to keep abreast of the health of performance metrics. Agent management is a
broad analysis of how agents are performing based on in-band performance
metrics of physical servers. Based on the health and busyness analysis results, you
can quickly locate faults. URL tests (tenant plane) can proactively identify
abnormal applications. URL tests (management plane) can proactively detect
abnormal cloud services.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 188
Huawei Cloud Stack
Solution Description 6 Cloud Management
Agents can be upgraded in batches, and the upgrade mode can be modified
in batches to improve O&M efficiency and ensure complete collection of in-
band performance data.
● Proactive and autonomous
– After executing URL test (tenant plane) tasks, O&M personnel can
proactively check the health of customers' applications and rectify faults.
– URL test (management plane) enables O&M personnel to proactively
identify cloud service resource availability and quickly handle faults.
● Quantified and precise
A busyness or health score is a computed representation of how well an
application is working based on its performance, utilization, or test data.
6.5.2.5.3 Functions
You can manage Agents, view and configure collection tasks as well as configure
threshold-crossing alarm rules, URL tests (tenant plane), URL tests (management
plane), and the health scoring system.
Collection Tasks
● Viewing Collection Tasks
View preset and custom collection tasks.
For details about the preset resource types and metrics, see "Performance
Metric Reference" in ManageOne 8.3.0 O&M Guide.
● Configuring Collection Tasks
Create collection tasks.
Agent Management
You can install and upgrade the Agent on an ECS or a physical server to monitor
the Agent status.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 189
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 190
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.5.4 Scenarios
Monitoring Configuration is used for routine monitoring and fault locating.
● Routine monitoring
Configure monitoring tasks and set alarm thresholds to facilitate routine
monitoring.
● Fault locating
If there is an exception, perform URL tests (tenant plane) to monitor health of
all applications and periodically perform URL tests (management plane) to
test against URLs of cloud services. This helps O&M personnel quickly locate
faulty resources and ensures cloud service availability.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 191
Huawei Cloud Stack
Solution Description 6 Cloud Management
Monitoring Configuration
1. Monitoring data collection
– Monitoring Configuration delivers a collection task to the performance
access point and then to the driver to collect performance data of
resources. The performance data is reported to the performance access
point using Ceilometer or CES.
– The performance collection module stores performance data to
Elasticsearch.
– Resource Monitoring obtains performance data from Elasticsearch.
2. Creating a threshold-crossing alarm rule
After a rule is created and delivered to Elasticsearch, Elasticsearch determines
whether to trigger an alarm based on the stored performance data. If an
alarm is triggered, it is reported and displayed on the alarm page of
monitoring details.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 192
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.2.5.6 Constraints
● Agent management
– The Agent can be installed only on an ECS where NPU or GPU cards are
installed to collect NPU or GPU data.
– Agent management does not support ECSs in the IaaS OpenStack
resource pool.
● URL test (tenant plane)
– Currently, a URL test can only be performed on applications. URL test
tasks have to be matched to specific applications.
– Only Huawei Cloud Stack scenarios are supported.
– In KVM, URL tests are supported by default. In FusionCompute, the
network is disconnected by default, but a customer can configure the
network for URL tests if necessary.
– During a URL test, the AutoOps capability channel is shared, so the OS
type supported by the test point depends on the OS type supported by
AutoOps.
– Up to 500 URL test tasks can be executed at once. Up to 5 tasks can be
executed for each tenant application, and up to 200 tasks can be
executed for a test point.
● URL Test (Management Plane)
– Currently, only resources associated with cloud services can be tested. All
test tasks belong to corresponding cloud services.
– The number of URL Test tasks for each cloud service cannot exceed 500.
In addition, the initiation point must be specified. The number of tasks on
a single node cannot exceed 200.
– The interval between two tasks is 10 ms. On a VM with 2 vCPUs and 2
GB memory, the CPU usage is about 10%, and the memory usage can be
ignored.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 193
Huawei Cloud Stack
Solution Description 6 Cloud Management
● CMDB
CMDB, short for Configuration Management Database, stores and manages
data of devices and systems in the enterprise IT architecture.
● Resource categories
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 194
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 195
Huawei Cloud Stack
Solution Description 6 Cloud Management
Network EIPs
Load Balancers
Bandwidths
NAT Gateways
VPCs
VPNs
Network ACLs
Security Group
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 196
Huawei Cloud Stack
Solution Description 6 Cloud Management
Network Routers
Firewall
Switches
Load Balancers
Other
● Rules
You can determine whether resource configurations are compliant by
configuring rules. After a rule is bound to a resource type, when the
configuration of the resource of this resource type changes, the rule is
automatically triggered to evaluate and check the change compliance.
● Tags
A tag identifies the category or content of a desired resource for easy query.
Administrators define tags and associate resources with tags to categorize
resources.
6.5.3.2 Benefits
Resource Management automatically discovers objects and collects data and uses
related rules to ensure data accuracy and reliability. It helps you centrally manage
resource information collected from multiple sources and comprehensively view
and maintain resources, improving O&M efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 197
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.3.3 Scenarios
Application scenarios of Resource Management are described as follows:
● Routine O&M: The system collects data from multiple sources and provides a
data validation and reconciliation mechanism to control the data write entry
to avoid unqualified data, providing reliable resource data for monitoring,
automated O&M, and alarms.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 198
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.3.4 Functions
● Resources displayed in multiple dimensions
Resources and their details can be view on the All Resources, VDCs, Resource
Pools, and Data Centers tab pages.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 199
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 200
Huawei Cloud Stack
Solution Description 6 Cloud Management
Other
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 201
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
By default, only virtual resources such as compute, storage, and network resources are
displayed. The security resources that are connected through Common Driver and
External Driver are displayed only when the corresponding system is connected to
ManageOne.
● Resource discovery
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 202
Huawei Cloud Stack
Solution Description 6 Cloud Management
Resources that have not been managed are displayed for you to manage.
Only managed resources can be displayed on the page displayed by choosing
Resource Topology > Resource Management > Resources.
● Audit rules
You can use common audit rules preset on ManageOne or create new ones to
query and manage non-compliant resources.
● Tag management
No. Description
● Modification records
You can view the resource change time and operator.
● Location management
Category Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 203
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 204
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.3.6 Constraints
In the one-level operations and two-level maintenance scenario, Resource
Management on ManageOne Maintenance Portal at the HQ displays only
resource information about the HQ, and Resource Management at branches
displays resource information about the branches.
Topology Object
Topology objects include topology nodes, links, and groups.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 205
Huawei Cloud Stack
Solution Description 6 Cloud Management
Nod A node is a basic unit of the topology structure and is used to identify a
e managed device. Nodes are classified into the following types based on
whether they are managed by the system:
● Physical nodes: devices managed by the system on the actual
network.
● Virtual nodes: devices that are not managed by the system or that do
not truly exist on the network. Adding existing virtual nodes to the
topology view helps you clearly understand the entire network.
Topology Type
● Physical topology: a topology view that consists of nodes, links, and groups. It
displays the structure of the entire network.
● Virtual network topology: is displayed through the topology of the target host
machine. It displays the network structure from the VM on the host machine
to the physical switches to which the VM is connected.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 206
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.4.2 Benefits
Topology Management automatically discovers device networking, status, and
links, and displays the network layout and status in a topology view, helping users
monitor the running status of the entire network in real time and quickly
demarcate network faults.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 207
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.4.3 Functions
Topology Management provides two key functions: viewing the topology view and
editing the topology view
● Viewing the topology view
– You can view information about the upstream and downstream nodes of
a node by region, data center, physical device, or virtual resource level.
You can also view information about the target node.
– You can view monitoring metrics and alarm information about physical
nodes.
– Allows users to view the brief information and status of physical links.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 208
Huawei Cloud Stack
Solution Description 6 Cloud Management
Only the topology views at the data center level can be edited.
Expanding a link
Collapsing a link
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 209
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.4.4 Scenarios
Topology Management is suitable for routine monitoring and fault diagnosis.
● In the initial phase of network construction, you can create network groups by
properly planning the network hierarchy to improve network visibility and
facilitate network management.
● During routine network monitoring, you can view and analyze the current
networking and network running status.
● When rectifying faults, you can quickly learn about the alarm severity of a
device based on the device color displayed in the topology view. You can view
the impacts of a faulty physical device on logical resources and locate the
physical device in the logical topology, improving O&M efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 210
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 211
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.4.6 Constraints
● Topology Management supports only the network topology of physical
devices monitored by eSight.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 212
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Before using Topology Management, add devices to eSight and enable LLDP
for the devices. Then, on ManageOne Maintenance Portal, choose Resource
Topology > Resource Management > Resource Discovery to manage
devices and assign physical locations to devices.
● Links are created based on analysis of traffic data between devices. No traffic
data does not mean that physical links are deleted. After a device link is
created, eSight does not automatically delete the link even if the link does not
exist in subsequent traffic data. You need to manually delete the link on
eSight after confirmation.
● When the network plane type of the host NIC is OVS, EVS, or SR-IOV VF, LLDP
link discovery is supported. If the network plane type of the host NIC is SR-
IOV PF, LLDP link discovery is not supported.
● E9000 intra-chassis link topologies are not supported. For example, links
between switch modules and blades, switches, or distributed storage are not
supported.
● The network link topology of distributed storage is not supported.
● The names of BMC ports cannot be displayed on the topology links between
server BMC ports and switches.
● If ECSs and management VMs use unified storage, storage links can be
displayed. If they use distributed storage, storage links cannot be displayed.
● If multiple links exist between two devices and the two ports of a link do not
exist in the port list of the corresponding device, the system combines the
links that do not exist in the port list into one link and displays it in the
physical topology.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 213
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 214
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Device Management
Obtains the list of devices to be maintained from Resource Management
(CMDB). Installs the Agent on the devices one by one or in batches to
establish maintenance channels among the devices in the management
system. Device objects include Elastic Cloud Servers (ECSs), Bare Metal Servers
(BMSs), servers (host machines and OBS servers), and management VMs.
● File Management
Allows you to upload and store files such as parameter files and patch
packages. You can then select parameters of file type when configuring
execution of operations or orchestrations.
● Operation Management
An operation is a minimum automated execution unit, consisting of
parameters and scripts. A single atomic O&M script is encapsulated into a
specific O&M operation to be executed. The system provides preset and
custom operation libraries. The preset operation library provides diverse preset
routine O&M operations. You can also add custom O&M operations suitable
for different O&M scenarios to the custom operation library.
● Orchestration Management
Automatically arranges, coordinates, and manages atomic operations and
sub-orchestrations. Atomic operations or sub-orchestrations can be
orchestrated using a unified workflow engine to suit diverse O&M scenarios.
● Job Management
Allows you to perform scheduled or periodic automation tasks. You can create
jobs and set different execution policies to schedule execution of operations
or orchestrations on specified devices.
● Job History
Records the execution history of all jobs to make it easier for you to query
execution results or audit operations.
● O&M Scenarios
Orchestrations are classified by scenario so that you can quickly find required
orchestrations and execute them based on scenarios.
● Security Policies
Identify sensitive commands in operations and control execution policies of
operations and orchestrations.
6.5.5.2 Benefits
Automated Jobs allows you to execute scripts on resources in batches to easily
implement routine O&M operations. You can use the orchestration engine to
orchestrate scenario-specific O&M operations or add custom orchestrations, and
assemble them to accommodate different O&M scenarios, like patch installation
and periodic health check, simplifying routine O&M.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 215
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 216
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.5.3 Functions
Automated Jobs provides the following functions: device management, operation
management, orchestration management, and job management.
● Device Management
No. Description
● Operation Management
No. Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 217
Huawei Cloud Stack
Solution Description 6 Cloud Management
No. Description
● Orchestration Management
● Job Management
6.5.5.4 Scenarios
● Table 6-71 describes application scenarios of Automated Jobs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 218
Huawei Cloud Stack
Solution Description 6 Cloud Management
Scenario Requirement
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 219
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Managed objects: Automated Jobs obtains the list of managed objects from
Resource Management (CMDB) and remotely executes scripts through the
Agent channel.
● Platform capability: Atomic operations can be orchestrated into standard
O&M actions using the orchestration engine, and can be executed according
to different policies.
● O&M scenarios: Routine O&M operations are designed based on O&M
scenarios.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 220
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.5.6 Constraints
● Automated Jobs does not support management VMs and servers of the IaaS
OpenStack resource pool.
● Only images in the same region can be cloned.
● In a region, the total number of ECSs and BMSs where the Agent is installed
cannot exceed 20,000.
● The managed Agent node or relay agent node must use an independent IP
address to provide services for external systems. IP address mapping is not
supported.
● The proportion of Automated Jobs tasks whose output text is 1 MB cannot
exceed 30% of the total tasks.
● To install the Agent on an ECS or BMS running some 64-bit OSs, you need to
manually create a Python package: For details about OSs which require
manually created Python packages, see Appendix: List of OSs for Which
Python Installation Packages Need to Be Created. For details about how to
create a Python package, see Creating a Python Installation Package for
Specific OSs on AutoOps.
● When Python scripts are executed on Automated Jobs, pexpect, a Python
module, cannot be used because it has reached the EOM.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 221
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 222
Huawei Cloud Stack
Solution Description 6 Cloud Management
Basic Description
Concept
Public cloud Internet Data Center (IDC) or third-party service vendors provide
resources such as applications and storage resources. It features
high scalability, low cost, lack of control over cloud resources,
low data security, and poor matching capability.
Cloud Users can request resources from the peer Huawei Cloud Stack
federation by interconnecting with Huawei Cloud Stack at the peer end. This
with Huawei ensures that resources can be borrowed quickly from the peer DC
Cloud Stack when resources in the local DC are insufficient.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 223
Huawei Cloud Stack
Solution Description 6 Cloud Management
Basic Description
Concept
6.5.6.1.2 Benefits
Resource Pool Analysis helps O&M personnel identify problems that occur during
resource pool running in a timely manner, provides capacity and resource analysis
capabilities, and instructs O&M personnel to plan activities such as capacity
expansion and reduction to improve resource utilization.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 224
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 225
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.6.1.3 Scenarios
The application scenarios of Resource Pool Analysis include resource pool
monitoring, multi-cloud monitoring, capacity management, and resource analysis.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 226
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.6.1.4 Functions
Resource Pool Analysis allows you to view the overview, capacity, load, analysis,
and resources in different dimensions.
● Overview
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 227
Huawei Cloud Stack
Solution Description 6 Cloud Management
d. Alarm thresholds can be configured for resource pool capacity and cloud
service capacity.
● Load
Displays load indicators from different dimensions and allows users to view
historical load indicators.
● Analysis
Predicts the CPU and memory capacity of resources in the next three months,
six months, and one year.
● Resource
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 228
Huawei Cloud Stack
Solution Description 6 Cloud Management
Each blue rectangle in the physical model represents a ManageOne O&M system.
Only the physical structure of the interconnection between the public security
network cloud (provincial police department) and several ManageOne O&M
systems can be displayed. Multi-level cloud management transforms the physical
model into an integrated multi-level cloud model. In the logical model, each
yellow rounded rectangle represents a cloud node. Define a number of cloud
nodes (for example, provincial police department cloud), and attach the public
security network cloud (provincial police department) and several ManageOne
O&M systems to cloud nodes. Each cloud node displays the resource data of
ManageOne O&M systems attached to the cloud node, and displays data statistics
and comparison.
● Physical model:
– In the first-level cloud model, the public security network cloud
(provincial police department) is the upper-level cloud, and the Internet
cloud (provincial police department), the video network cloud (provincial
police department), and the public security network cloud (city A) are
lower-level clouds.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 229
Huawei Cloud Stack
Solution Description 6 Cloud Management
– In the second-level cloud model, the public security network cloud (city
A) is the upper-level cloud, and the Internet cloud (city A) and the video
network cloud (city A) are lower-level clouds.
● Logical model:
– Cloud nodes are created in the two upper-level clouds (ManageOne O&M
systems) in the physical model.
▪ Create a cloud node in the public security network cloud (city A):
cloud in city A.
– The public security network cloud (provincial police department), Internet
cloud (provincial police department), and video network cloud (provincial
police department) are attached to the provincial police department
cloud, and the public security network cloud (provincial police
department) is the local cloud under the provincial police department
cloud.
– The public security network cloud (city A), Internet cloud (city A), and
video network cloud (city A) are attached to the cloud in city A. The
public security network cloud (city A) is the local cloud under the cloud in
city A.
NOTE
Elasticsearch is a search server that provides the data storage, query, and computing
capabilities.
6.5.6.1.6 Constraints
Table 6-73 lists the capabilities supported by ManageOne Resource Pool Analysis.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 230
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 231
Huawei Cloud Stack
Solution Description 6 Cloud Management
Clo Resource pool of Suppo Sup Supp Not Sup Not Supp
ud federated cloud rted por orted suppo port support orte
fed (with Huawei ted rted ed ed d
era Cloud Stack)
tio
n
wit
h
Hu
aw
ei
Clo
ud
Sta
ck
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 232
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.6.2.2 Benefits
VDC Analysis is used to analyze resources from the VDC perspective, which helps
administrators manage resources and improve resource utilization.
VDC-based resource monitoring with clear layers
VDC Analysis helps users centrally monitor cloud resources in different VDCs by
using the VDC-based monitoring model, simplifying resource management in
VDCs at all levels.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 233
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.6.2.3 Scenarios
VDC application scenarios include VDC-based monitoring.
VDC-based monitoring
Provides unified monitoring and statistics capabilities from the VDC perspective
help O&M administrators monitor VDC resources and quotas and learn the
running status of VDCs at all levels in a timely manner.
6.5.6.2.4 Functions
VDC Analysis monitors and analyzes resources from the VDC perspective and
provides the resource overview, resource, and quota functions.
● Overview
Allows you to view summary information about VDCs at all levels, including
basic information, resource statistics, and ECS load statistics.
● Resource
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 234
Huawei Cloud Stack
Solution Description 6 Cloud Management
Displays resource quota details of VDCs at all levels by region, resource pool,
and AZ.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 235
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 236
Huawei Cloud Stack
Solution Description 6 Cloud Management
Idle Resources
Resources with low resource usage for a long time are idle resources. The rules for
determining whether a resource is idle can be configured as required.
Bottleneck Resources
Resources with high resource usage for a long time are bottleneck resources. You
can configure the rules for determining whether a resource is a bottleneck
resource as required.
6.5.6.3.2 Benefits
● Capacity analysis: allows you to flexibly set thresholds to identify global
capacity risks in a timely manner.
– It provides flexible capacity threshold setting capabilities by cloud services
and resource pools to identify global capacity risks in a timely manner.
– Capacity statistics results are centrally displayed by region, resource pool,
and AZ.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 237
Huawei Cloud Stack
Solution Description 6 Cloud Management
● With Idleness Analysis, the system identifies resource waste and improve
global resource utilization.
– Resource idleness rules provide flexible algorithm configuration
capabilities, and the thresholds for determining whether a resource is idle
can be customized.
– The system can analyze global idle resources and centrally display the
identified resources by VDC, resource pool, and application.
– Based on the identified idle resources, this feature provides the
recommended volume of each resource and you can reduce the resource
volume based on the recommendations.
● With Bottleneck Analysis, the system can identify bottleneck resources and
global bottleneck risks in a timely manner.
– Bottleneck rules provide flexible algorithm configuration capabilities, and
the thresholds for determining whether a resource is a bottleneck
resource can be customized.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 238
Huawei Cloud Stack
Solution Description 6 Cloud Management
– The system can analyze global bottleneck resources and centrally display
the identified resources by VDC, resource pool, and application.
– Based on the identified bottleneck resources, this feature provides the
recommended volume of each resource and you can expand the resource
capacity based on the recommendations.
6.5.6.3.3 Functions
Scenario-specific Analysis provides the capacity analysis, resource idleness analysis,
and resource bottleneck analysis capabilities.
● Capacity Analysis
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 239
Huawei Cloud Stack
Solution Description 6 Cloud Management
– You can set the rules for determining idle resources based on specific
business requirements.
– Capacity reduction suggestions for each ECS and EVS disk are provided.
– The amount of resources that can be saved after resource optimization
can be estimated and the improved resource usage can be predicted.
● Bottleneck Analysis
– You can set the rules for determining bottleneck resources based on
specific business requirements.
– Capacity expansion suggestions for each ECS and EVS disk are provided.
– How many resources are required for resource optimization can be
estimated.
6.5.6.3.4 Scenarios
Scenario-specific Analysis applies to capacity analysis, resource idleness analysis,
and resource bottleneck analysis scenarios.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 240
Huawei Cloud Stack
Solution Description 6 Cloud Management
1. Capacity Analysis
With Capacity Analysis, O&M administrators can view global capacity risks
and capacity resource statistics and centrally monitor the cloud service
capacity and resource pool capacity by region, resource pool, and AZ. This
helps them learn capacity data in real time and analyze capacity expansion or
reduction solutions based on the data.
2. Idleness Analysis
Idle resources can be identified and analyzed globally and by VDC, resource
pool, and application, and resources with low usage can be reclaimed in a
timely manner.
3. Bottleneck Analysis
Bottleneck resources can be identified and analyzed globally and by VDC,
resource pool, and application, and resources with high usage and capacity
risks can be identified in a timely manner. Based on this, corresponding
preventive measures can be taken.
6.5.7 My Reports
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 241
Huawei Cloud Stack
Solution Description 6 Cloud Management
Data Set
A data set consisting of multiple dimensions and indicators is an application-
oriented unified data model provided by MODataNebula. It can be regarded as a
container of indicators.
Dimension
A dimension is an aspect from which people observe the objective world, and is a
high-level type division. When analyzing data, go from general to specific, from
macroscopic to microscopic, from global to partial, and from overall to detail.
Associations are established among multiple dimensions to provide clues for
analysis.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 242
Huawei Cloud Stack
Solution Description 6 Cloud Management
Attribute
Resource attribute includes ID and name. Unlike a dimension, an attribute:
● Cannot be used for aggregation calculation.
● Displays the resource status.
Indicator
Specific indicator of centralized data storage. Generally, the indicator value is a
number that changes over time. For example, the CPU usage of an ECS instance is
an indicator provided by Huawei Cloud ECS. This indicator is based on raw data
aggregation and supports multiple aggregation modes, such as Avg, Max, Sum,
and Count.
● The performance metric data is reported to Elasticsearch every 5 minutes. The
metric data in the report comes from Elasticsearch.
● The data storage mechanism of Elasticsearch is as follows:
– Within 7 days: A performance metric data record is generated every 5
minutes.
– 7 days to 6 months: A performance metric data record is generated every
30 minutes. The data record is generated after Elasticsearch processes
performance metric data every 5 minutes within half an hour. It can be
the maximum, minimum, or average value, or other value types within
that period.
– More than 6 months: One performance metric data record is generated
every day. The data record is a value by calculating the average value of
all performance metric data records generated every 30 minutes in one
day, for example, the average value of all maximum values generated
every 30 minutes in one day.
● The maximum, minimum, average, and peak values of each performance
metric displayed in the report are calculated based on the performance metric
data stored in Elasticsearch. Table 6-74 lists the calculation methods.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 243
Huawei Cloud Stack
Solution Description 6 Cloud Management
Drill Up
A drill-up report allows you to navigate from lower-level data to higher-level data
within a hierarchy, for example, from fifth-level VDC to first-level VDC.
Drill Down
A drill-down report gives you deeper data insights by navigating from a higher
level down to the next within a hierarchy, for example, from year to month.
Drill Through
A drill-through report displays another aspect of data instead of a more granular
view. For example, drilling through on the quantity of new ECSs can display
relevant AZs and resources pools.
Periodic Report
Reports can be sent to specified personnel by email on a configurable cadence.
6.5.7.2 Benefits
● Various O&M scenarios meeting user requirements
You can preset reports for typical service scenarios, comprehensive data sets,
and custom reports to meet the requirements of various O&M scenarios.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 244
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 245
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.7.3 Functions
This section describes the functions of My Reports in terms of preset reports,
custom reports, periodic task management, and data set management.
Preset Reports
You can preset multidimensional analysis reports and details reports for direct use
in typical service scenarios. The reports can be displayed in tables and charts.
● Table: supports data analysis such as filtering, sorting, drilling, and drilling
through data.
● Chart: displays data in a line, bar, or donut chart by indicator or legend and
tabulates data in columns.
Area Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 246
Huawei Cloud Stack
Solution Description 6 Cloud Management
Area Description
3 Configuration Panel for filtering data, where you can focus on key
data
5
: Deletes the current report.
Custom Reports
Multiple data sets, such as alarms, performance, capacity, and resources allow you
to flexibly select and filter the dimensions and indicators you want to display.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 247
Huawei Cloud Stack
Solution Description 6 Cloud Management
3 You can set the filter criteria, such as the time range, dimension, and
indicator, for the new report.
4 This area displays report data. You can click Refresh Diagram to
update the data.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 248
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 249
Huawei Cloud Stack
Solution Description 6 Cloud Management
3
You can click to display the report customization page.
6.5.7.4 Scenarios
View preset, custom, or periodic task reports to find key data among scattered
network data for easier decision-making and regular reporting.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 250
Huawei Cloud Stack
Solution Description 6 Cloud Management
basis for capacity allocation. Reports display abundant data and are easy to
use. They solve the following problems:
– Difficulty obtaining data
Business personnel often need to contact R&D personnel to write SQL
statements to extract data and view data in each dimension. Only then
can they make decisions.
– Low report generation efficiency and difficult maintenance
It takes a long time to change the data report code in the background
analysis system. Report maintenance is difficult.
● Regular reporting
Administrators can analyze periodic reports and use them for regular
reporting.
Data set Data obtained from the ES server is divided into different data sets
based on data types, including alarms, performance, capacity, and
resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 251
Huawei Cloud Stack
Solution Description 6 Cloud Management
Logical Description
Architectu
re
6.5.7.6 Constraints
● Up to 300 reports (including preset and custom reports) are supported.
● Up to 10 reports can be selected when you create a periodic task.
● Up to 100 periodic report tasks are supported. It is recommended that up to
five tasks be executed every hour and that the interval between two tasks be
10 minutes.
– Up to 80 tasks being executed or paused are supported.
– If there are 200,000 VMs, up to 50 tasks being executed or paused are
supported.
● By default, only filter criteria and tables are displayed in exported periodic
reports.
● An exported Excel report contains up to 50,000 rows of data.
● An exported PDF report contains up to 10 columns and 2000 rows of data.
Extra data will be cut by default.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 252
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.8.1.2 Benefits
The system administrator and maintenance personnel periodically check the
system through Health Check and rectify faults based on the check results to
ensure that the cloud platform and services run properly and stably for a long
time.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 253
Huawei Cloud Stack
Solution Description 6 Cloud Management
ManageOne Health Check uses one-click health check to check the node
health status and identify potential system problems, achieving proactive
O&M.
● Customized Health Check Scenarios
You can select a health check task based on site requirements. Currently, you
can select routine health check and pre-upgrade check tasks.
● Diversified Health Check Modes
Health Check supports real-time tasks, scheduled tasks, and periodic tasks.
You can configure tasks based on environment requirements.
● Intuitive Display of Health Check Results
Health Check displays check results in pie charts, lists, and health check
reports, helping O&M personnel intuitively obtain the health status of
products.
6.5.8.1.3 Functions
● Creating, modifying, and deleting health check tasks
1 You can create tasks for routine health check and pre-upgrade
check.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 254
Huawei Cloud Stack
Solution Description 6 Cloud Management
No Supported Capability
.
4 You can export health check reports, which contain basic information
about health check tasks, check results, and fault handling
suggestions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 255
Huawei Cloud Stack
Solution Description 6 Cloud Management
personnel use the health check function to periodically check projects or sites
to identify issues and potential risks in the environment, reduce and prevent
accidents, and handle potential risks in advance.
● Pre-upgrade Check
You can perform a pre-upgrade check for whether issues involved in the
precautions occur in identify upgrade risks and handle the risks in advance.
1. Administrators can create health check tasks and select objects and check
items as required.
2. Perform health check after the health check task is created.
3. Check the health check result. If any exception occurs, rectify the fault based
on fault rectification suggestions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 256
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
The Log Management function under System applies only to IAM 2.0 and ManageOne
Maintenance Portal deployed at branches in the one-level operations and two-level
maintenance scenario.
● Log Management is used to store and manage security, system, and operation
logs on ManageOne Maintenance Portal.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 257
Huawei Cloud Stack
Solution Description 6 Cloud Management
Run Log
Collects logs generated when cloud service and ManageOne are running.
Log Management
Stores and manages security, system, and operation logs on ManageOne
Maintenance Portal.
Cluster Status
The cluster status is Elasticsearch status. Elasticsearch is used to store data, mainly
call chain data and run logs.
Index
In a database, an index is an independent and physical storage structure for
sorting values of one or more columns in a database table. An index is a set of
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 258
Huawei Cloud Stack
Solution Description 6 Cloud Management
values of one or more columns in a table and a logical pointer list that points to
the data pages of physically identified values in the table. The function of an index
is similar to the directory of a book. You can quickly find the required content
based on the page number in the directory.
6.5.8.2.2 Benefits
By viewing different types of logs, you can trace the system running process,
detect security risks, locate and rectify faults, and reduce O&M costs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 259
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.8.2.3 Functions
Log Type
● To view run logs generated when cloud service and ManageOne are running,
choose Routine O&M > Logs > Run Logs.
– Typical templates of run logs are preset based on common cloud service
fault scenarios. You can download run logs by template and combine
related cloud service log paths and customize log templates if the preset
templates cannot meet your requirements.
– You can download management run logs and run logs of tenant
management nodes.
– The cluster status, node status, CPU usage, and load usage are displayed.
– The collection configuration of cloud service run logs is preset. You can
view Service/Microservice and Path.
● To view tenant operation logs. Choose Routine O&M > Logs > Tenant
Operation Logs.
This function allows you to record logs of operations performed by users on
ManageOne Operation Portal, Maintenance Portal, and Operations Command
Center and operation logs reported by cloud services.
Area Description
● To view management operation logs, choose Routine O&M > Logs >
Management Operation Logs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 260
Huawei Cloud Stack
Solution Description 6 Cloud Management
● To use Log Management, choose System > Log Management from the main
menu.
This function allows you to store and manage security, system, and operation
logs on ManageOne Maintenance Portal.
Log dump Dumps logs from the database to the hard disk as CSV or ZIP
files. The dumped logs are automatically deleted from the
database.
Log Storage
To ensure information traceability and data integrity in a running system, log files
can be stored, dumped, and forwarded. Table 6-84 lists storage, dump, and
forwarding mechanisms for different log types.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 261
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 262
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 263
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 264
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 265
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.8.2.4 Scenarios
By viewing different types of logs, you can trace the system running process,
detect security risks, locate and rectify faults, and reduce O&M costs.
● Security audit
By viewing management operation logs and tenant operation logs, you can
understand user behavior and detect suspicious activities. The system records
logs for important service operations (including system parameter
configuration, and resource configuration and release) to ensure that the
system running information can be traced. If any exception log is found,
report it to the upper-level department and handle it in a timely manner.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 266
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Run logs are collected from cloud services and ManageOne and can be
downloaded on the GUI.
● Tenant operation logs are reported by cloud services. Tenant operation logs
provided on the GUI are used for locating faults.
● Management operation logs in Logs are proactively reported by management
systems such as devices supporting Syslog or RESTful and eSight.
6.5.8.2.6 Constraints
● Currently, management operation logs on the Logs > Management
Operation Logs page can be reported only through RFC 3164 or RFC 5424.
● Management run logs in the IaaS OpenStack resource pool cannot be
collected on the Logs > Run Logs page.
● Management Operation Logs under Logs > is used to forward operation
logs of each management system or device on the cloud platform that
supports the Syslog or RESTful protocol. The local storage capability is limited.
If a large number of management systems or devices are connected to the
system or logs are stored for a long time, the logs may be automatically
dumped.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 267
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.8.3 Troubleshooting
6.5.8.3.2 Benefits
Troubleshooting provides wizard-based troubleshooting capabilities for different
scenarios. A unified entry and process guide allows you to quickly master the fault
locating and troubleshooting methods.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 268
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 269
Huawei Cloud Stack
Solution Description 6 Cloud Management
Displays the ECS status in real time, associates alarm information, and
accurately displays information about faulty nodes, facilitating fault locating.
● Efficient display
Graphically displays the historical I/O performance data of EVS disks, helping
users quickly detect abnormal performance data.
6.5.8.3.3 Functions
Troubleshooting allows you to troubleshoot faults and handle faults.
● Fault demarcation
Displays the IP address of a faulty node and name of a faulty module.
● Fault analysis
End-to-end analysis on call chains enables in-depth service tracing. Code-level
error information helps fault locating.
● Duration analysis
Displays the invoking delay, assisting in performance analysis.
● Log downloading
Exports service logs associated with request and job IDs for accurately
locating root causes.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 270
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Offline analysis
Allows customizing run log downloading tasks for further offline analysis.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 271
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.8.3.4 Scenarios
Troubleshooting is mainly used in troubleshooting scenarios, helping O&M
personnel quickly locate and demarcate faults.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 272
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 273
Huawei Cloud Stack
Solution Description 6 Cloud Management
ECS Storage Allows you to identify ECS EVS disk I/O performance
Troubleshooting problems by viewing ECS details, collecting the ECS
alarms, and viewing EVS disk performance monitoring
data.
6.5.8.3.6 Constraints
● In the Huawei Cloud Stack scenario, the password used for interconnecting
eSight with BMC cannot be updated, and the cloud platform fault diagnosis
(call chain) does not support onboarded IaaS OpenStack resource pools.
● ECS network troubleshooting and ECS storage troubleshooting support only
FusionSphere OpenStack resource pools.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 274
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.9 Introduction
Component
A component is the basic unit for certificate application and update. For example,
FusionGuard and API Gateway are two different components of Certificates. A
server component can be depended by multiple client components. The certificate
information (such as the type and dependency) of client components is managed
by the server in a unified manner.
CA Certificate
Certificate Authority (CA) certificate, also called a root certificate, is a digital
certificate issued by the CA and contains its own public key information. CA is
responsible for issuing and managing digital certificates. It must be a trusted
third-party organization and is the core authority of the Public Key Infrastructure
(PKI).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 275
Huawei Cloud Stack
Solution Description 6 Cloud Management
Certificate Revocation
Certificate revocation indicates that a certificate is revoked irreversibly and does
not have the authentication capability. For example, if an improper certificate
authority issues a certificate, the private key is damaged or the user no longer has
the private key exclusively. As a result, the private key is stolen.
Certificate Type
6.5.9.2 Benefits
O&M personnel can efficiently maintain various certificates on the point-and-click
interface of Certificates.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 276
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.9.3 Functions
The Certificates feature allows you to configure and maintain certificates.
● Certificate configuration
a. Certificate parameters: Configure the certificate format, key pair
generation algorithm, key pair length, and certificate validity period.
b. CRL information: Import a CRL containing certificates that should no
longer be trusted.
● Certificate maintenance
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 277
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.9.4 Scenarios
Certificates is mainly used to view, replace, and revoke certificates.
● Viewing a certificate
After registering a certificate with Certificates, O&M personnel can view the
certificate details, such as the region, component, and update time. They can
also check the certificate status, for example, whether the certificate is about
to expire.
● Replacing a certificate
When a certificate expires, O&M personnel can update or import the O&M
certificate based on whether CA parameters need to be configured.
● Revoking a certificate
O&M personnel can deliver certificate revocation information to invalidate an
unnecessary certificate.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 278
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.9.6 Constraints
● gPaaS & AI DaaS services are not involved in Certificates. For details about
how to manage certificates, see related service guides.
● Up to two layers of CA certificates can be configured or imported.
6.5.10 Accounts
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 279
Huawei Cloud Stack
Solution Description 6 Cloud Management
Account
An account is the basic unit for changing and verifying passwords. For example, if
FusionSphere and ManageOne have multiple accounts, users can change the
passwords in batches.
6.5.10.2 Benefits
Account Management allows O&M personnel to perform simple operations on the
GUI to quickly maintain account passwords for system security.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 280
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.10.3 Functions
● Querying account information
a. View basic account information, including the account type, account ID,
region and component an account belongs to.
b. Query the component that the account belongs to and synchronize the
password to each component when an account belongs to different
components.
c. View the historical modification tasks of an account and the task
execution status.
● Account management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 281
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.10.4 Scenarios
● Viewing account details
When an account password is about to expire or has expired, use the account
management function to maintain the account.
● Changing passwords in batches
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 282
Huawei Cloud Stack
Solution Description 6 Cloud Management
1. Each cloud service registers accounts with Accounts for unified management.
2. Accounts allows verifying, amending, and changing account passwords.
– Amending passwords can be completed using Accounts.
– The password verification and management task needs to be delivered to
the cloud service or the Agent on the VM where the account is located.
3. A password maintenance task is delivered.
– If an OS account is used, the operation command will be delivered to the
Agent on the VM where the account is located.
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 283
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.10.6 Constraints
● Some accounts of gPaaS & AI DaaS services are not applicable to Accounts.
For details about how to manage accounts, see Huawei Cloud Stack 8.3.0
Account List.
● Up to 100,000 accounts can be managed by default.
● A backup server has been configured.
● The backup password has been set.
SFTP
Secure File Transfer Protocol (SFTP) introduced in SSHv2 enables secure file
transfers.
Full Backup
A full backup copies all data or applications at a point in time.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 284
Huawei Cloud Stack
Solution Description 6 Cloud Management
Incremental backup
Incremental backup is used to back up the data newly added or modified since the
last full or incremental backup.
6.5.11.2 Benefits
6.5.11.3 Functions
If a third-party SFTP backup server is available, data of resource pools,
ManageOne, and EI services is backed up to the third-party SFTP backup server on
ManageOne Maintenance Portal.
NOTE
After gPaaS & AI DaaS services are connected, the CloudDB and CloudMiddleWare
backup policies must be configured. Otherwise, data is backed up every 30 days by
default.
Backup Management provides the following functions: backup configuration,
backup policy, and task list.
● Backup configuration: Create, modify, view, delete, and synchronize backup
server parameter values in each region. View system information about each
component and manually trigger immediate backup.
● Backup policy: Create, modify, view, and delete basic backup policy
information.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 285
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 286
Huawei Cloud Stack
Solution Description 6 Cloud Management
Stora Scalable File Service (SFS) GaussDB data, KMC key N/A
ge files, WCC key files, and
servic certificates
es
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 287
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 288
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 289
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 290
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 291
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.11.4 Scenarios
Backup Management applies to service upgrade or major service changes.
6.5.11.6 Constraints
Resource pools, ManageOne, ModelArts, and EI services are supported.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 292
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 293
Huawei Cloud Stack
Solution Description 6 Cloud Management
SNMP
Simple Network Management Protocol (SNMP) is a network management
protocol of the TCP/IP protocol suite. It enables remote users to view and modify
the management information about a network element (NE). This protocol
ensures the transmission of management information between any two nodes.
The polling mechanism is adopted to provide basic function sets. According to
SNMP, both hardware and software agents can monitor the activities of various
devices on the network and report these activities to the network console
workstation.
LVS
Linux Virtual Server (LVS) uses IP load balancing and content-based request
distribution technologies to combine a group of physical servers into one scalable
and highly-available virtual server in the Linux kernel.
Southbound API
A southbound API is used to connect the lower-layer NMS to devices, provision
services, and transmit performance metric data.
6.5.12.1.2 Benefits
Using System Integration, you can quickly connect a system to ManageOne and
centrally manage the system, which improves O&M efficiency.
● Fast creation
– You can configure brief information to connect to systems in a short time
without regard to their differences.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 294
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.1.3 Functions
With System Integration, you can manage cloud platforms, connect to
ManageOne, manage trust certificates, and configure data channels and
southbound connection.
● Cloud platform management
The Cloud Platform Management page displays information about default
and new cloud platforms. You can view cloud platform information, add,
modify, and delete cloud platforms.
● Connection to ManageOne
One ManageOne system can be connected to the other to manage the
connected one.
● Trust certificate
ManageOne uses trust certificates to authenticate third-party systems during
system connection. You can upload or delete trust certificates. Trust
certificates are different from certificates on the Certificates page where only
certificates used by the current cloud platform are managed. Trust certificates
are TLS certificates of the peer cloud platform.
● Data channel
– A data channel is used when the administrator needs to configure SFTP
user information on ManageOne Maintenance Portal. This system stores
configuration information about data reporting so that the data required
by ManageOne Operation Portal can be properly reported and exported.
– System connection management is used when the administrator needs to
configure information about connection to other management systems.
This system stores the preset configuration items for connecting to other
management systems, such as usernames, passwords, and port numbers.
● Southbound configuration
– Domain name management allows you to configure the mapping
between the IP address and domain name of a third-party system that
connects to a drive.
– LVS configuration is used to configure SNMP alarms, modify and delete
SNMP parameter values.
6.5.12.1.4 Scenarios
ManageOne can borrow or manage resources of the peer cloud platform.
● Scenario 1: resource borrowing
If resources in the local cloud resource pool are insufficient, you can quickly
borrow resources from the peer cloud resource pool for it.
● Scenario 2: unified management of multiple clouds
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 295
Huawei Cloud Stack
Solution Description 6 Cloud Management
You can use ManageOne to centrally manage and monitor multiple resource
pools.
ManageOne can develop a drive based on existing drives, access mode, or
standard. After a system is connected to ManageOne on System Access,
ManageOne can obtain information about resources, alarms, and performance of
the connected system.
● Connection to a system when the drive meets requirements
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 296
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
User Management and User Policies under System > Security Management are available
only in IAM 2.0 and ManageOne Maintenance Portal deployed at branches in one-level
operations and two-level maintenance scenario.
Permissions
A permission defines what operations a user can perform on what objects.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 297
Huawei Cloud Stack
Solution Description 6 Cloud Management
Managed Objects
Managed objects refer to physical objects (such as servers and network devices)
and virtual objects (such as VMs) that can be managed by users.
Object types that can be managed by a user are selected during user
authorization. The following describes examples of these types:
● All resources: All managed objects in the system.
● Resource groups: A resource group is a collection of resources configured by
resource type using the resource group function.
Users
A user is the identifier of a user in the system, which has the username, password,
and permission attributes.
Based on user types, users can be classified into the following types:
● Local user: indicates the user who logs in to and is authenticated on
Maintenance Portal.
● Third-party system access user: indicates the machine-machine account used
to interconnect Maintenance Portal with a third-party system.
● Remote user: indicates the user for interworking with the Lightweight
Directory Access Protocol (LDAP) or Remote Authentication Dial In User
Service (RADIUS) server.
The default user bss_admin is the system administrator. The bss_admin user can
manage all managed objects and has all operation rights. It belongs to both the
Administrators and SMManagers roles.
NOTICE
● The bss_admin user has the highest permission for the system and all
managed objects. Exercise caution when using the bss_admin user to perform
operations and do not perform any operations that hinder system security. For
example, do not share or disclose the name and password of the bss_admin
user.
● bss_admin is the default username of the system administrator. You can
rename the username by referring to "User Authentication" > "userTools.sh" in
ManageOne 8.3.0 Command Reference under ManageOne 8.3.0 Reference
Guide.
Roles
A role is a collection of operation rights and managed objects.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 298
Huawei Cloud Stack
Solution Description 6 Cloud Management
Users attached to a role have all the operation permissions granted to the role.
You can quickly authorize a user by attaching the user to a role, facilitating
permission management. Figure 6-133 describes the role attributes.
Users attached to the same role have the operation rights on the same managed
objects. Users attached to multiple roles have the operation rights on managed
objects of these roles.
Security Policies
The security policy provides the user access control function, including setting the
account policy, password policy, login IP address control policy, and login time
control policy.
6.5.12.2.2 Benefits
● Security administrators can grant permissions by role to implement
management of minimum permissions and proper allocation of managed
objects. This reduces security risks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 299
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 300
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.2.4 Functions
● The user permission management function enables you to grant proper
permissions to users with different responsibilities and adjust permissions
based on service changes.
● The user monitoring function enables you to forcibly log out users who
perform unauthorized operations.
● Users can configure the system login mode, and perform SSO configuration
and remote authentication configuration.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 301
Huawei Cloud Stack
Solution Description 6 Cloud Management
Figure 6-134 and Figure 6-135 show the logical architecture of user authorization
in User Management.
● Authorization for default roles: You can attach a user to a default role. The
user inherits the permissions of the role.
● Authorization for custom roles: To authorize a user with an object on which
this user needs to perform operations, you can add this object to the
managed objects of the role that this user is attached to. To authorize a user
with an operation that this user needs to perform, you can add this operation
to the operations contained in the role that this user is attached to.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 302
Huawei Cloud Stack
Solution Description 6 Cloud Management
Before managing licenses, you need to understand the following basic concepts:
● License: Licenses are classified into product licenses and cloud service licenses.
ManageOne allows you to import product licenses and cloud service licenses
at the same time. Whereas, other non-ManageOne products or cloud services
in the same region support only one type of licenses.
● License: A license is an agreement between Huawei and a customer on the
application scope, functions, and validity period of the product that has been
sold or purchased. The license information is contained in the license file.
● License file: A license file specifies the capacity, functions, and validity period
of software, including equipment serial numbers (ESNs), grace period,
resource control items, function control items, and sales information items.
There are three types of license files: permanent commercial, fixed-term, and
permanent commercial+fixed-term.
● ESN: An ESN, also called equipment fingerprint, uniquely identifies a device. A
license can be allocated to the correct device based on the ESN.
Each license file contains ESNs of devices to which the license will be
allocated. The system compares the ESN corresponding to a device in the
license file with the one loaded to the device to determine whether the
license has been allocated to the correct device.
● Revocation code: A revocation code is a string generated after a license file is
revoked, based on which you can identify the revoked license file. If the
current license file is invalid or about to expire, or the capacity does not meet
service requirements, you can revoke the license file to obtain a revocation
code and use the revocation code to quickly and accurately request a new
license file.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 303
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.3.2 Benefits
License Management allows the system to run properly based on the features,
capacity, and validity period authorized in a license file.
6.5.12.3.3 Scenarios
License Management is applicable to the following scenarios: initial license file
loading, license update, and routine license maintenance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 304
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 305
Huawei Cloud Stack
Solution Description 6 Cloud Management
After the system is deployed, you need to import and load the correct license
file to ensure smooth system running.
● Routine license maintenance
You can check the expiration date of a license in a timely manner to identify
and solve problems. For example, a control item is expired or overused.
● License update
You must update a license file if any of the following is detected during O&M:
– A control item is expired.
– The used quantity of a control item exceeds the total quantity.
You are advised to update a license file if any of the following is detected
during O&M:
– A control item is about to expire.
– The used quantity of a control item exceeds the threshold.
6.5.12.3.4 Functions
License Management provides multiple functions to ensure that the system is used
within the license scope.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 306
Huawei Cloud Stack
Solution Description 6 Cloud Management
After a license file is imported, the license file is checked and whether the device
ESN matches the one in the license is checked. The license file can be in the valid
and available, invalid but available, or invalid and unavailable state. After a valid
license file is revoked, the license file enters the invalid but available state.
Table 6-90 lists license statuses.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 307
Huawei Cloud Stack
Solution Description 6 Cloud Management
Valid and available If the value of File Status is Valid and available, the
license file is in the validity period. In this case, users can
properly use the resources and functions specified in the
license file.
Invalid but If the value of File Status is Invalid but available, the
available license file is in the grace period. In this case, users can use
the resources and functions specified in the license file
until the grace period expires.
NOTE
For details about the number of days in a grace period, see the
license file. The default value is 60 days. After the grace period,
the license file cannot be used.
Invalid and If the value of File Status is Invalid and unavailable, the
unavailable license file has expired. You cannot use the resources and
functions specified in the license file. You need to update
the license file. Otherwise, you cannot log in to the
system.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 308
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.4 CA Service
Concepts
● Certificate Authority (CA): An authoritative and impartial third-party
organization responsible for issuing, authenticating, and managing
certificates. A CA is a tree structure consisting of a root CA and multiple
subordinate CAs.
● Certificate Revocation List (CRL): A list of certificates that have been revoked
by the issuing CA before their scheduled expiration date. It is a kind of
certificate blacklist.
● Root CA: The top-level CA in the CA hierarchy. It is the start point of the entire
CA chain of trust. The corresponding CA certificate is self-signed and does not
need to be verified by other CAs.
● Subordinate CA: A certificate authority signed by the root CA or other
subordinate CAs.
NOTE
The root CA issues root certificates using the same 'subject' and 'issuer' names,
whereas the subordinate CA issues subordinate certificates using different 'subject' and
'issuer' names.
● Certificate chain: An ordered list of certificates from multiple levels of CAs. A
certificate chain verifies the certificates issued by the lowest-level CA in the
certificate chain.
NOTE
The issuer of the current CA certificate is the subject of the upper-level CA certificate.
● PKI: public key infrastructure, which is a standards-compliant infrastructure
that adopts public key theory and technology to provide security services.
● End entity: end user of a PKI product or service. It can be an individual, an
organization, a device (such as a router or firewall), or a process running on a
computer.
● End-entity certificate: A certificate that does not use its key to issue other
certificates.
● Cross-certificate: a certificate used for cross-certification between different
CAs. For example, if there are two CAs: CA1 and CA2, CA1 has issued the
device certificate cacert1, and CA2 has issued the device certificate cacert2,
cacert1 can only be authenticated by CA1, whereas cacert2 can only be
authenticated by CA2. To enable CA1 to authenticate cacert2, export the
public key of CA2 to apply for a CA certificate crosscert2 from CA1, and
crosscert2 is a cross-certificate. In this way, CA1 can authenticate cacert2
through the path CA1 > crosscert2 > cacert2. The cross-certificate is an
intermediate certificate (bridge) that connects CA1 and CA2.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 309
Huawei Cloud Stack
Solution Description 6 Cloud Management
Signature Description
Algorithm
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 310
Huawei Cloud Stack
Solution Description 6 Cloud Management
Signature Description
Algorithm
6.5.12.4.2 Benefits
The Certificate Authority Service provides functions such as configuring and
managing CAs, certificate profiles, and CRLs. It also supports the standard
Certificate Management Protocol (CMP) and privacy CA protocol. With the
Certificate Authority Service, you can quickly obtain and use certificates, reducing
the costs of certificate application.
6.5.12.4.3 Scenario
Based on the functions provided by the Certificate Authority Service, you can
quickly obtain and use certificates by setting CA parameters.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 311
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
The Certificate Authority Service issues identity certificates only to Huawei network
management software and devices, and cannot issue certificates to third-party devices,
software, or individual users.
6.5.12.4.4 Functions
This section describes the functions of the Certificate Authority Service from
aspects of PKI management, protocol configuration and certificate application.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 312
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Whitelist On the Whitelist page, you can add, import, delete, and
query whitelists and configure policies. Whitelists are
used for CMP interaction. CA verifies the Common
Name (CN) of the certificate subject in the request. A
certificate can be applied for only when the CN is in the
whitelist.
Certifica Certificate On the Certificate Application page, you can apply for
te Applicatio a certificate in different modes as required.
Applicat n
ion
List The application list displays certificate applications
Request submitted by users.
Global Port View the current port status and manually enable or
Configu Managem disable the HTTP port, TLS one-way authentication port,
ration ent TLS two-way authentication port or privacy CA protocol
port.
NOTE
HTTPS is more secure than HTTP. Therefore, you are advised to
select HTTPS (Auth peer via HTTPS or No auth peer via
HTTPS) when configuring CMP.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 313
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
HSM Management HMS Management: You can add HMSs to the system
for use. CA keys can be generated and stored using the
HMS. All key operations are performed in the HMS. The
keys are stored in the HMS and cannot be obtained by
external systems to ensure key security.
When applying for a certificate using the Certificate Authority Service, you need to
configure the CA information, certificate profile, whitelist, and CRL as required.
Certificate application methods:
● Manual: You can apply for a certificate by entering basic information,
uploading a CSR file, or using dual certificates.
● Automatic: You can apply for a certificate by configuring CMP or privacy CA
protocol information.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 314
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.5.2 Benefits
Task Center provides a unified task management portal for multiple ManageOne
services, helping O&M personnel view and centrally execute tasks and improving
O&M efficiency.
6.5.12.5.3 Functions
6.5.12.5.4 Scenarios
● Collection task
After a task of a feature is registered with Task Center, users can view the task
execution status and start or stop the task.
● Hosting task
After a task of a feature is hosted to Task Center, users can only view the task
execution status.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 315
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.6.2 Benefits
The SNMP NBI enables third-party systems to access CloudSOP for monitoring
and managing alarms on networks.
6.5.12.6.3 Scenarios
The SNMP NBI is used when third-party systems interact with CloudSOP through
SNMP. O&M personnel can set parameters to interconnect third-party systems
with CloudSOP.
6.5.12.6.4 Functions
The SNMP NBI provides the following functions:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 316
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 317
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.7.2 Benefits
Integration Gateway provides an enhanced flow control mechanism for
northbound and southbound APIs, improving reliability of API providers and
preventing core services from being overloaded due to abnormal flow.
6.5.12.7.3 Functions
● Northbound flow control
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 318
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.8 RemoteNotifyService
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 319
Huawei Cloud Stack
Solution Description 6 Cloud Management
Table 6-93 lists the email and SMS notification functions supported by
ManageOne.
6.5.12.8.2 Benefits
RemoteNotifyService provides the message sending function and allows O&M
personnel to set the message content and sending rules as required so that the
system can send alarms and events to relevant personnel in a timely manner
through SMS messages or emails based on the set message content and sending
rules and the relevant personnel can take corresponding measures, reducing O&M
costs and improving O&M efficiency. O&M personnel can also manually send
notifications to relevant personnel so that they can obtain the notification content
in a timely manner.
6.5.12.8.3 Scenarios
● If network O&M personnel cannot view alarms or events on the system in a
timely manner during non-working time or business trips, such information
can be sent to them through emails or SMS messages.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 320
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.8.4 Functions
The notifications feature provides SMS settings, email server settings, notified user
management, traffic control, template management, notification sending, and
notification log query and export. By enabling these functions, the notifications
feature allows you to send messages to O&M personnel and the notified users in
the form of SMS messages or emails.
NOTE
Users can set the phone number and email address of the O&M personnel for alarm
notification on the Notified User Management page.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 321
Huawei Cloud Stack
Solution Description 6 Cloud Management
1. Before notifications are sent, O&M personnel need to set parameters for
interconnection between the server and the notifications feature to ensure
smooth sending of SMS messages and emails.
2. O&M personnel can set notification rules to enable the system to send alarms
and events to other O&M personnel or notified users using SMS messages or
emails through the SMS gateway, or email server.
3. O&M personnel can configure notification templates to manually send SMS
messages or emails to other O&M personnel or notified users through the
SMS gateway or email server.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 322
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
● If AdminConsoleHome is not installed, the Custom Settings menu and its submenus are
not displayed.
● The Personal Settings function applies only to IAM 2.0 and ManageOne Maintenance
Portal deployed at branches in the one-level operations and two-level maintenance
scenario.
6.5.12.9.2 Benefits
This feature enables you to customize custom settings (such as date and time
format settings) and personal settings (such as password settings) based on your
operation habits, improving user experience.
6.5.12.9.3 Functions
This feature allows you to change passwords, personal information, and custom
settings.
6.5.12.9.4 Scenarios
This feature allows you to change passwords, personal information, and custom
settings.
● Changing a password
To improve system security, you are advised to periodically change the user
password.
● Changing personal information
You can change the mobile number, email address, welcome message, wait
time before automatic logout, and more as required.
● Changing custom settings
If the default date or time format does not comply with your operation habits
or the time zone on the client is different from that on the server, you can set
it as required.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 323
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
Changing You can change the mobile number, email address, welcome
personal message, wait time before automatic logout, and more as
information required.
Changing If the default date and time zone, time format, or number
custom format does not comply with your operation habits, you can
settings customize it as required.
You can change custom settings such as date and time zone,
and time format settings.
● Setting the date and time zone
You can set the system date format and client time zone as
required, including the date separator, date format, and
client time zone.
● Setting the time format
You can set the time format of the client as required,
including the time format and time indicator.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 324
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.10.2 Benefits
The event mechanism provides a unified event listening and publishing interface
for services. It allows the server to push events to browsers and listen to and
publish events registered by the foreground, facilitating secondary service
development and service construction. Broadcast messages enable you to send
notifications to other users conveniently and instantly.
6.5.12.10.3 Scenarios
Broadcast messages are used in the following scenarios:
● Pushing Server Events
During routine maintenance, you can use this function to notify client users of
some messages or events, for example, alarm color change events, as required
by related services.
● Pushing Server Messages
During routine maintenance, you can use this function to notify online O&M
users of some server messages, for example, critical alarms, as required by
services.
● Sending Client Notifications
A user, such as the administrator, can send broadcast messages to notify all
online users of information.
6.5.12.10.4 Functions
Users can use broadcast messages to push server events, listen to and publish the
events registered by the foreground, and broadcast messages.
Table 6-95 describes the functions of broadcast messages.
Function Description
Pushing server Services need to call the RESTful interface of the servers to
events push messages to the broadcast message server. The server
then pushes the messages to the client.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 325
Huawei Cloud Stack
Solution Description 6 Cloud Management
Function Description
NOTE
The Customization function applies only to IAM 2.0 and ManageOne Maintenance Portal
deployed at branches in the one-level operations and two-level maintenance scenario.
6.5.12.11.2 Benefits
Personalized Customization provides personalized maintenance functions. You can
set logos and manage the login page based on your preferences or requirements,
improving user experience.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 326
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.5.12.11.3 Functions
● Logos on the browser tab, in the navigation pane, in the login dialog, and in
the advertisement area on the login page can be uploaded as images. After
the cache is cleared, the updated logos are displayed. You can also restore the
default settings as required.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 327
Huawei Cloud Stack
Solution Description 6 Cloud Management
3 You can add, modify, and delete quick navigation groups on the login
page. You can also add, delete, and modify entries in a group.
6.5.12.11.4 Scenarios
● Changing logos
If the preconfigured logos cannot meet requirements, you can change the
logos on the browser tab, in the navigation pane, in the advertisement area
on the login page, and in the login dialog as required.
● Customizing the login page
O&M personnel can update or hide the copyright information on the login
page, switch the system language between Chinese and English, and add
quick navigation links to meet different O&M requirements.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 328
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.6.1 Introduction
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 329
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
MapReduce Service (MRS) provides the data service for Operations Command Center from
the underlayer, not the GUI.
6.6.2 Functions
This section describes key functions of Operations Command Center.
NOTE
Digitized shift scheduling is only supported when the Monitoring platform is independently
deployed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 330
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 331
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Shift scheduling: You can schedule shift time of staff members to properly
manage your workforce and improve operational efficiency.
● Alarm management: Real-time monitoring enables alarms to be reported
immediately after faults occur so that on-duty personnel can discover and
troubleshoot faults in a timely manner.
● Event management: supports end-to-end (E2E) life-cycle management of
events, such as grading and handling.
● Issue management: allows users to handle R&D issues and stay on top of
handling progress.
● Dashboard monitoring: You can subscribe to diverse applications containing
comprehensive O&M data so you can stay informed of resource statuses,
quickly identify idle resources, and scale resources in a timely manner.
6.6.3 UI Overview
This section describes the UI overview of Operations Command Center.
NOTE
The UI may vary depending on user roles. For details about the UI operation permissions of
different roles, see 6.6.4 Role Introduction.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 332
Huawei Cloud Stack
Solution Description 6 Cloud Management
Analysis
NOTE
The Analysis platform is not supported when the Monitoring platform is independently
deployed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 333
Huawei Cloud Stack
Solution Description 6 Cloud Management
Menu Description
Monitoring
(in the Move your pointer to this icon to view your personal information,
upper right such as your to-do tasks and submitted requests. You can also log
corner of out of the system.
the page)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 334
Huawei Cloud Stack
Solution Description 6 Cloud Management
Area Description
Click this icon to view the help center or to learn which version is
(in the in use.
upper right
corner of
the page)
Shift Set shift time and shift transfer times for staff members to
Schedules properly manage your workforce and improve operational
efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 335
Huawei Cloud Stack
Solution Description 6 Cloud Management
Area Description
Drop-down Click the arrow and select Analysis to access the Analysis
arrow (in platform.
the upper
left corner
of the
page)
Table 6-99 Roles and their permissions involved when the Monitoring platform is
independently deployed
Name Description Monitoring System
Platform Management
Permissions Permissions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 336
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 337
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 338
Huawei Cloud Stack
Solution Description 6 Cloud Management
● The enterprise cloud needs to be adapted to each public cloud service, a huge
workload. Enterprise cloud users cannot access new public cloud services
directly.
● Public cloud services can go online quickly, but if a function is changed, it
takes a lot of time to adapt it to the enterprise cloud.
● It is hard to connect an enterprise cloud with Platform as a Service (PaaS) and
Software as a Service (SaaS) services on a public cloud.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 339
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Unified operations for your Huawei Cloud Stack and Huawei Cloud
– A federated cloud integrates the regions and service catalogs of Huawei
Cloud. Enterprise customers can take advantage of a broad range of
Huawei Cloud services.
– A federated cloud supports multi-cloud VDC management, VDC rights-
and domain-based management, and unified metering. VDC users can
use both public cloud and Huawei Cloud Stack resources.
● Unified O&M of your Huawei Cloud Stack and Huawei Cloud resources. Cloud
resources, performance metrics, reports, and dashboards are all brought
together into a one-stop cloud resource management platform. The following
Huawei Cloud services can all be managed in one place:
– Elastic Cloud Server (ECS)
– Elastic Volume Service (EVS)
– Virtual Private Cloud (VPC)
– Virtual Private Network (VPN)
– Elastic IP (EIP)
– Image Management Service (IMS)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 340
Huawei Cloud Stack
Solution Description 6 Cloud Management
If you need to monitor the performance of these services, log in to Huawei Cloud
Console using a Huawei Cloud account and access Cloud Eye to view the monitoring
data.
Once the long credentials have been unified, Huawei Cloud Stack users can access
regions in Huawei Cloud to request and use cloud resources without an additional
login.
Any metadata files that are changed will now need to be changed on both clouds.
For instance:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 341
Huawei Cloud Stack
Solution Description 6 Cloud Management
Unified VDC When creating or modifying a VDC, users can set the
quota quota consumption amount of the VDC on Huawei Cloud.
managem
ent
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 342
Huawei Cloud Stack
Solution Description 6 Cloud Management
Unified Resource Users can view resources requested from Huawei Cloud
resource overview in the resource center. Currently, the following resource
center types are supported: ECS, EVS, EIP, VPC, RDS 6.5, CCE,
and MRS.
NOTE
● Tenants who have logged in to the Huawei Cloud console can purchase resources there.
The resource purchase and subsequent operations such as order management, task
center, operation log, and resource life cycle management are all executed on Huawei
Cloud.
● On the federated cloud, the consumption statistics of Huawei Cloud services used by the
tenants cannot be queried.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 343
Huawei Cloud Stack
Solution Description 6 Cloud Management
The following Huawei Cloud services can be maintained on ManageOne: ECS, EVS,
IMS, VPC, EIP, VPN, ELB, RDS 6.5 (MySQL/SQL Server/Postgres), OBS, and DCS 6.5
The following functions are supported:
● Centralized cloud resource monitoring
ManageOne allows you to view the information and status of Huawei Cloud
resources from the perspectives of the database, compute, storage, and
network.
● Centralized performance monitoring
ManageOne Maintenance Portal connects to Cloud Eye in each region on
Huawei Cloud to query and display performance monitoring statistics of all
tenants. The topology of the performance monitoring system is illustrated in
Figure 6-151.
NOTE
Ensure that UVP VMTools has been installed on the Huawei Cloud ECS. If it has not
been installed, access Huawei Cloud Help Center and search for UVP VMTools to
obtain the help document.
● A maintenance dashboard
ManageOne Maintenance Portal shows an overview of each region on
Huawei Cloud.
● Statistical reports
ManageOne Maintenance Portal allows you to collect statistics on
performance load reports of Huawei Cloud resources.
NOTE
For details about the O&M management functions of Huawei Cloud Stack, see
ManageOne 8.3.0 O&M Guide.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 344
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Service scaling
A federated cloud allows users to use Huawei Cloud public cloud services to
expand the capabilities of services currently deployed on Huawei Cloud Stack.
The following problems are resolved:
– Huawei Cloud Stack struggles to handle sudden spikes in demand.
– For a business that is expanding internationally, it is important to have
local resources that can be provisioned rapidly for branch offices around
the world.
– Resources need to be quickly expanded in peak hours.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 345
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 346
Huawei Cloud Stack
Solution Description 6 Cloud Management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 347
Huawei Cloud Stack
Solution Description 6 Cloud Management
● A federated cloud allows users to use public cloud services to expand the
capabilities of services currently deployed on an enterprise cloud, as shown in
Figure 6-156.
Flexible and rapid service expansion is used to solve the following problems:
– Enterprise clouds struggle to handle sudden spikes in demand.
– For a business that is expanding internationally, it is important to have
local resources that can be provisioned rapidly for branch offices around
the world.
– Resources need to be quickly expanded in peak hours.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 348
Huawei Cloud Stack
Solution Description 6 Cloud Management
After configuring the SNAT, the enterprise cloud administrators can register
accounts in Huawei Cloud and access Huawei Cloud resource pools to obtain
quotas and manage Huawei Cloud resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 349
Huawei Cloud Stack
Solution Description 6 Cloud Management
After accessing Huawei Cloud resources, you can associate a Virtual Data Center
(VDC) with Huawei Cloud regions as required and obtain specified resource
quotas. These Huawei Cloud resources and Huawei Cloud Stack resources are
managed and used in the VDC in a unified manner, as shown in Figure 6-161.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 350
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Service management
Allows users to customize Huawei Cloud services, bring them online or offline,
and publish them.
● Approval process management
Supports the approval process. The application, use, and change operations of
Huawei Cloud resources can be controlled to ensure proper resource use.
● VDC metering
Supports VDC metering to collect statistics on resource usage and adjust and
use resources properly.
● VDC self-O&M
Supports VDC self-O&M. By setting resource thresholds, alarms, and
subscription notifications, tenants can learn about VDC resource usage and
replenish resources in a timely manner to ensure normal service running.
● Order management
Supports the generation of orders such as application, change, and deletion of
Huawei Cloud resources. The approval process is used to ensure that
operations can be controlled and resources can be used properly.
● Resource lifecycle management
Supports lifecycle management of hybrid cloud resources. Frozen period can
be set for hybrid cloud resources. Hybrid cloud resources can be restored or
completely deleted from the recycle bin.
● Task center
Displays the progress and results of some hybrid cloud tasks that cannot
immediately produce results or take a long time to finish so that users can
learn the task status.
● Operation log
Allows users to record, query, and export all operation logs of management
plane hybrid cloud.
Currently, the tag function and role customization functions are not supported by
hybrid clouds.
Ensure that UVP VMTools has been installed on the Huawei Cloud ECS. If it has not
been installed, access Huawei Cloud Help Center and search for UVP VMTools to
obtain the help document.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 351
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Unified report
ManageOne Maintenance Portal allows you to collect statistics on reports of
each region on Huawei Cloud.
● Unified big screen display
ManageOne Maintenance Portal shows the overview of each region on
Huawei Cloud on a dashboard.
● Unified capacity monitoring
ManageOne Maintenance Portal allows you to monitor capacity and collect
statistics on quota usage of each region in Huawei Cloud.
6.7.2.1 Overview
Local Huawei Cloud Stack (referred to as the local cloud) can borrow resources
from peer Huawei Cloud Stack (referred to as the peer cloud) to suit a burst
growth of resources without performing any scale-out. In addition, advanced
services can be centrally managed in one cloud and easily shared to the other
cloud. For instance, the local cloud can directly request big data services from the
peer cloud.
ManageOne can borrow peer cloud resources using the following methods:
● API interconnection: The local cloud supports only four common services: ECS,
EVS, VPC, and EIP.
● Cloud federation: The local cloud supports service registration. Registered
services can borrow all service resources from federated tenants of the peer
cloud.
Figure 6-163 shows the logical architecture of Cloud Federation with Huawei
Cloud Stack.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 352
Huawei Cloud Stack
Solution Description 6 Cloud Management
Figure 6-163 Logical architecture of Cloud Federation with Huawei Cloud Stack
6.7.2.2 Scenarios
Applicable to Huawei Cloud Stack scenarios
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 353
Huawei Cloud Stack
Solution Description 6 Cloud Management
NOTE
Huawei Cloud Stack can connect to the financial zone of Huawei Cloud through Huawei
Cloud Stack Online.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 354
Huawei Cloud Stack
Solution Description 6 Cloud Management
The federated cloud supports the unified operation of Huawei Cloud Stack and
HCS Online.
● Integrates the regions and service catalogs of HCS Online. Enterprise
customers can take advantage of a broad range of HCS Online services.
● Supports multi-cloud VDC management and VDC rights- and domain-based
management. VDC users can use both HCS Online and Huawei Cloud Stack
resources.
The federated cloud supports unified O&M functions of Huawei Cloud Stack and
HCS Online, including resource management, alarm management, performance
management, report management, and big screen demonstration. The following
HCS Online services can all be managed in one place:
● Elastic Cloud Server (ECS)
● Elastic Volume Service (EVS)
● Virtual Private Cloud (VPC)
● Elastic IP (EIP)
● Image Management Service (IMS)
● Security Group (SG)
● Relational Database Service 6.5 (RDS 6.5)
● Elastic Load Balance (ELB)
● Object Storage Service (OBS)
● Distributed Cache Service 6.5 (DCS 6.5)
NOTE
If you want to monitor the performance of other HCS Online services, use the HCS Online
account to log in to HCS Online and use Cloud Eye to view the monitoring data.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 355
Huawei Cloud Stack
Solution Description 6 Cloud Management
Once the long credentials have been unified, Huawei Cloud Stack users can access
the regions in HCS Online to request and use HCS Online resources without an
additional login.
Any metadata files that are changed will now need to be changed on both clouds.
For instance:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 356
Huawei Cloud Stack
Solution Description 6 Cloud Management
● Tenants can purchase resources only after they switch from Huawei Cloud Stack to the
HCS Online console. Therefore, the resource purchase and subsequent operations, such
as order management, task center, operation log, and resource life cycle management,
are performed on HCS Online.
Ensure that UVP VMTools has been installed on the HCS Online ECS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 357
Huawei Cloud Stack
Solution Description 6 Cloud Management
For details about the O&M management functions of Huawei Cloud Stack, see
ManageOne 8.3.0 O&M Guide.
6.8 CloudGateway
6.8.1 Overview
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 358
Huawei Cloud Stack
Solution Description 6 Cloud Management
6.8.2 Scenarios
CloudGateway is mainly used in scenarios where remote O&M is required between
Huawei Cloud Stack remote O&M platform and customer cloud.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 359
Huawei Cloud Stack
Solution Description 6 Cloud Management
The local O&M team of the customer cloud or branch cloud cannot help handle
O&M complexities or the O&M capability is weak. Therefore, O&M of the Huawei
Cloud Stack remote O&M platform is required. Huawei Cloud Stack remote O&M
platform provides remote assisted O&M or managed O&M. The customer cloud is
connected to the Huawei Cloud Stack remote O&M platform in regular connection
or persistent connection mode. When the customer cloud accesses the Huawei
Cloud Stack remote O&M platform, the following requirements must be met:
● After the VPN is used for network connection, high network security is
required to prevent communication ports from being exposed by the firewall.
● During access to the Huawei Cloud Stack remote O&M platform, the local
network configuration of the customer cloud needs to be simplified.
● The local customer cloud wants to audit instructions delivered by the Huawei
Cloud Stack remote O&M platform to make the operations performed on the
customer cloud transparent.
● The connection channel can be independently and conveniently enabled or
disabled.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 360
Huawei Cloud Stack
Solution Description 7 Compute Services
7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 361
Huawei Cloud Stack
Solution Description 7 Compute Services
Function
The ECS service allows you to:
● Customize the flavor, image, network, disk, authentication mode, and number
of ECSs when creating ECSs.
● Manage the lifecycle of an ECS, including starting, stopping, restarting, and
deleting an ECS. Clone an ECS, create an ECS snapshot, and manage the
watchdog status and HA status. Modify vCPUs and memory of an ECS.
● Expand the capacity of EVS disks attached to an ECS, attach EVS disks to an
ECS, detach EVS disks from an ECS, and use shared EVS disks for an ECS.
● Change and reinstall the ECS OS, and create a private image using an existing
ECS.
● Bind an elastic IP address (EIP) to and unbind an EIP from an ECS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 362
Huawei Cloud Stack
Solution Description 7 Compute Services
Reliabi The ECS service can work with ● Traditional servers, subject to
lity other cloud services, such as hardware reliability issues,
storage services and disaster have a higher likelihood of
recovery & backup services, to failure. You need to manually
enable flavor change, data backup, back up their data.
recovery using a backup, and rapid ● You need to manually restore
recovery from a fault. their data, which may be
complex and time-consuming.
Securit The security service ensures that ● You need to purchase and
y ECSs work in a secure environment. deploy security measures
This service protects your data, additionally.
hosts, and web pages, monitors ● It is difficult to perform access
program execution, and checks control on multiple users to
whether ECSs are under brute force multiple servers.
attacks and whether remote logins
are performed. This aims to
enhance your system security and
mitigate the risks of ECS intrusion
by hackers.
Scalab ● You can modify an ECS flavor, ● Configurations are fixed and
ility including the number of CPUs are difficult to meet changing
and memory size. needs.
● You can expand the capacity of ● Hardware upgrade is required
the system disk and data disk. for modifying configuration,
● Auto Scaling (AS) is used, which which takes a long time and
enables you to configure AS the service interruption time
policies so that ECSs are is uncontrollable. Service
automatically added and scalability and continuity are
removed during traffic peaks low.
and lulls, respectively. This
ensures that your service
requirements are met and
maximizes resource utilization.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 363
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 364
Huawei Cloud Stack
Solution Description 7 Compute Services
Elastic EVS provides storage for ECSs. You can attach EVS disks to an
Volume ECS, detach EVS disks from an ECS, and expand the capacity of
Service EVS disks of an ECS.
(EVS)
Image You can create an ECS using a public image, private image, or
Managemen shared image. You can create a private image using an ECS.
t Service
(IMS)
Cloud Server CSBS provides users with on-demand backup service. Users can
Backup apply for backup for certain ECSs based on their service
Service requirements so that the ECSs can be automatically and rapidly
(CSBS) restored in the event of data loss or damage.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 365
Huawei Cloud Stack
Solution Description 7 Compute Services
Service Description
Name
Auto Scaling After AS is used and AS policies are configured, the system
(AS) automatically adds ECSs during traffic peaks and releases ECSs
during traffic lulls, meeting your service requirements and
maximizing resource utilization.
Elastic Load ELB distributes service loads to multiple ECSs, improving the
Balance system's service processing capability. ELB performs health
(ELB) checks on ECSs to automatically remove abnormal ECSs and
distribute service loads to healthy ones, ensuring service
continuity.
Virtual VPC provides networks for ECSs. You can use the rich functions
Private of VPC to flexibly configure a secure running environment for
Cloud (VPC) ECSs.
Usage Instructions
Max. enterprise projects supported
● A maximum of 100 enterprise projects can be created in a VDC. If there are
more than 100 enterprise projects, ECS usage will be affected.
Precautions for using ECSs
● Virtualization software cannot be installed on ECSs for secondary
virtualization.
● Audio adapters are not supported.
Precautions for using Windows ECSs
This section describes only common constraints on using Windows OSs. For details
about all constraints, visit the official website.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 366
Huawei Cloud Stack
Solution Description 7 Compute Services
Table 7-3 KVM hosts and ECSs supported by different deployment scales
Deployment ≤ 50 ≤ 100 ≤ 200 ≤ 500 ≤ 1,000 ≤ 4,000 PMs (2,000
Scale PMs PMs PMs PMs PMs KVMs + 2,000 BMSs)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 367
Huawei Cloud Stack
Solution Description 7 Compute Services
Combined Provides a backend service for ECSs. It can be seen as the server
API (ECS) end of ECS_UI, and can call FusionSphere OpenStack
components. Requests sent by an ECS from the console are
forwarded by ECS_UI to Combined API and are returned to
ECS_UI after being processed by Combined API.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 368
Huawei Cloud Stack
Solution Description 7 Compute Services
Type Description
Unified O&M Combined API reports ECS log, monitoring, and alarm
information to the ManageOne O&M module.
Workflow
Figure 7-4 shows the workflow for creating an ECS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 369
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 370
Huawei Cloud Stack
Solution Description 7 Compute Services
a. The ECS API of Combined API calls the VPC API of Combined API.
b. The VPC API calls Neutron to create an EIP or a port.
3. Create storage resources, corresponding to step 4 to step 6 in the preceding
figure.
a. The ECS API of Combined API calls the EVS API of Combined API.
b. The EVS API calls Cinder.
c. Cinder creates volumes in the storage pool according to storage resource
application policies.
4. Create compute resources, corresponding to step 7 to step 8 in the preceding
figure.
a. The ECS API sends the request to Nova.
b. Nova creates an ECS in the compute resource pool.
Definition
Bare Metal Server (BMS) is a way of provisioning dedicated physical servers for
tenants. It provides the excellent computing performance and data security
needed for core databases, key application systems, and high-performance
computing (HPC). With the high scalability offered by cloud resources, you can
apply for and use BMSs flexibly.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 371
Huawei Cloud Stack
Solution Description 7 Compute Services
Functions
● Auto Provisioning
After you apply for a BMS, OS installation, network configuration, and disk
attachment are completed automatically.
● EVS Disks
You can attach, detach, or expand the capacity of EVS disks without stopping
your BMS.
● VPC and Custom Network
BMSs can communicate with ECSs in the same VPC, and can communicate
with each other through a customized network.
● Lifecycle Management
You can use the management console to start, stop, restart, and delete BMSs.
NOTE
No performance and feature loss: BMSs have all the features and advantages of physical
servers. Your applications can access the BMS CPU and memory without any virtualization
overhead.
Provisio Automatic Y N Y
ning provisioning
method
Exclusive resources Y Y N
EVS disks Y N Y
Network VPC Y N Y
Communication Y N Y
between physical
servers and VMs
through the VPC
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 372
Huawei Cloud Stack
Solution Description 7 Compute Services
NOTE
You must add a high-speed NIC when applying for a BMS. High-speed NICs cannot be
added to or removed from a BMS after the BMS is successfully applied for.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 373
Huawei Cloud Stack
Solution Description 7 Compute Services
The following figures show the NIC and bond configuration information.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 374
Huawei Cloud Stack
Solution Description 7 Compute Services
7.2.2.2 EIP
An elastic IP address (EIP) is an independent public IP address. You can bind an EIP
to a BMS to enable BMSs in your VPC to be accessible from the Internet through a
fixed public IP address.
Definition
A local disk is a disk attached to the physical machine (host) where an instance
resides, and is a temporary block storage device. Storage devices of this type
provide block-level data access capability for instances, and present high I/O
performance, low latency, and high throughput. Local disks are temporary block
storage where data cannot be stored permanently. When your instance is
migrated from one host machine to another, the local disk will not be migrated
with the instance, and data will be lost. EVS disks can be used for permanent
storage. Data in EVS disks is not lost with the start, stop, or migration of the
instance.
Table 7-6 shows the differences between local disks and EVS disks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 375
Huawei Cloud Stack
Solution Description 7 Compute Services
Local Compared with EVS disks, local Local disk performance depends on
disk disks have stable I/O workloads on physical hosts, and a
performance and high local disk can be an SPOF. Local disks
throughput but: are only appropriate for systems that
● No blank local disks can be will only run for a short while and
created independently, and have low requirements on stability
no local disks can be created and reliability.
from snapshots. You are advised to synchronize
● Local disks cannot be important data on local disks to
attached on the console. other ECSs or back up the data to
EVS disks to ensure data availability.
● Local disks cannot be
independently detached and
released.
● The capacity of local disks
cannot be expanded.
● Local disks cannot be
reinitialized.
● No snapshots can be
created for local disks, and
therefore, local disks cannot
be rolled back from
snapshots.
● Local disks do not support
VM live migration or flavor
change.
● The capacity and quantity of
local disks are not limited by
the VDC quota, and the
usage statistics cannot be
collected.
Table 7-7 shows the relationship between disks for BMSs and local disks and EVS
disks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 376
Huawei Cloud Stack
Solution Description 7 Compute Services
● Life cycle: The life cycle of local disks depends on the life cycle of BMSs.
Therefore, the life cycle of local disks starts or ends as the life cycle of BMSs
starts or ends.
● Configuration selection: Local disks can only be started when BMSs are
started. Therefore, when a local disk serves as a system disk, it can be
specified as the boot device only during BMS flavor creation. When a local
disk serves as a data disk, it can be specified as a temporary disk only during
BMS flavor creation. .
Table 7-7 Relationship between disks for BMSs and local disks and EVS disks in
different deployment scenarios
Only local disks can be used as Local disks and EVS disks can be used as
system disks. data disks.
Impact on the data status of local disks when you perform operations on
instances
Table 7-8 shows the impact on the data status of local disks when you perform
operations on the instances where the local disks reside.
Table 7-8 Impact on the data status of local disks when you perform operations
on the instances where the local disks reside
Constraints
If you create an instance configured with a local disk and the local disk serves as
the system disk, you do not need to manually initialize the local disk, and the local
disk will be automatically initialized after the instance is created. If the local disk
serves as a data disk, you need to log in to the instance, and then partition and
format the local disk. In addition, you cannot perform certain operations on local
disks as you do on EVS disks:
● No blank local disks can be created independently, and no local disks can be
created from snapshots.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 377
Huawei Cloud Stack
Solution Description 7 Compute Services
7.2.3 Advantages
BMS has the following technical advantages:
● Hybrid Deployment and Flexible Networking
BMSs within an AZ can communicate with each other through an internal
network. VPCs can be used to connect BMSs and external resources. You can
also use BMSs together with other services, such as ECS, to achieve hybrid
deployment, offering flexible networking and meeting requirements in
complex application scenarios.
● High Stability and Reliability, and Optimal Performance
The BMS service provides dedicated BMSs for tenants. The tenants can enjoy
stable performance provided by physical servers, meeting performance,
stability, data security, and regulation requirements of some services.
● High Throughput and Low Latency
The BMS service provides a high-throughput and low-latency network for
BMSs in an AZ. The BMS service can provide a maximum bandwidth of 10
Gbit/s and a minimum latency of 25 μs. This network can be used in scenarios
requiring high throughput and low latency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 378
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 379
Huawei Cloud Stack
Solution Description 7 Compute Services
● Security-Demanding Scenario
To provide strictly-protected data required by customers and meet compliance
regulations for service deployment in financial and security industries, use
physical servers to ensure that resources can be exclusively used and to realize
data isolation, controllability, and traceability.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 380
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 381
Huawei Cloud Stack
Solution Description 7 Compute Services
Console It is the portal of the BMS service. It is integrated into ECS UI.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 382
Huawei Cloud Stack
Solution Description 7 Compute Services
Type Description
Unified O&M Combined API reports BMS log, monitoring, and alarm
information to the ManageOne O&M module.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 383
Huawei Cloud Stack
Solution Description 7 Compute Services
Service Flow
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 384
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 385
Huawei Cloud Stack
Solution Description 7 Compute Services
1. A user applies for resources on the BMS GUI, and the request is sent to
Combined API.
2. Combined API (BMS) calls the interfaces of EVS, VPC, and IMS.
3. VPC calls Neutron to create an EIP or a port. EVS calls Cinder to create an EVS
disk based on the policy for applying for storage resources. IMS calls Glance
to query image information.
4. BMS sends the creation request to Nova.
5. Nova sends the request to Ironic to create a BMS instance.
Serv Description
ice
EVS EVS enables you to attach EVS disks to a BMS and expand their capacity.
VPC You can configure a logically isolated network for your BMSs and
configure IP address segments, VPN, and bandwidth in VPCs. A VPC
facilitates internal network management and configuration and allows
you to modify networks quickly and securely. You can also customize the
BMS access rules within a security group or between security groups to
strengthen BMS security.
IMS IMS enables you to use public images to create BMSs, improving BMS
deployment efficiency.
● Web UI
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 386
Huawei Cloud Stack
Solution Description 7 Compute Services
Tenants in B2B scenarios), click in the upper left corner of the page,
select a region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Bare Metal Server (BMS) 8.3.0 Usage Guide (for Huawei Cloud Stack
8.3.0).
Definition
An image is an Elastic Cloud Server (ECS) template that contains software and
other necessary configurations, including an OS, preinstalled public applications,
user's private applications, and user's service data. Images are categorized into
public, private, and shared images.
Image Types
● Public Image
Public images are standard images provided by the cloud platform system,
including the common standard OS and preinstalled public applications.
Public images provide easy and convenient image self-service management
functions, and are visible to all users. You can conveniently use a public image
to create an ECS or BMS.
● Private Image
Private images created based on ECSs or external image files are visible only
to users who create them. Private images include OSs, preinstalled public
applications, user's private applications, and user's service data.
According to different user services, private images can be classified into the
following types:
– System Disk Image
A system disk image is an image created using the system disk, including
an OS, preinstalled public applications, and user's private applications.
– Data Disk Image
A data disk image contains user's service data only.
– Full-ECS Image
A full-ECS image contains an OS, preinstalled public applications, user's
private applications, and user's service data.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 387
Huawei Cloud Stack
Solution Description 7 Compute Services
You can create a system disk image, data disk image, or full-ECS image using
an ECS or external image file.
Using the created system disk image to create ECSs eliminates the need to
manually configure multiple ECSs repeatedly.
Using the created data disk image to create EVS disks flexibly migrates service
data and shares service data among multiple ECSs.
Using the created full-ECS image to create an ECS quickly migrates the whole
VM.
● Shared Image
You can share your private images with other users. If you are a multi-
resource space user, the image sharing function allows you to use images
conveniently across multiple resource spaces in the same region.
The image provider can share specified images, cancel image sharing, and
add or delete tenants with whom they share images. The recipient can choose
to accept or refuse images shared by other users, and can remove the images
they have accepted.
The functions of the preceding three types of images are as follows:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 388
Huawei Cloud Stack
Solution Description 7 Compute Services
7.3.2 Advantages
IMS has the following advantages:
● Convenient
You can create private images using ECSs or external image files, and create
ECSs in batches using images.
● Safe
An image file has multiple redundant copies, ensuring high data durability.
● Flexible
IMS allows customers to manage their images on the page or using APIs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 389
Huawei Cloud Stack
Solution Description 7 Compute Services
● Unified
IMS allows users to uniformly deploy and upgrade application systems,
improving O&M efficiency and ensuring consistent application environments.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 390
Huawei Cloud Stack
Solution Description 7 Compute Services
It is recommended that you use IMS together with ECS and OBS.
Architecture
The following shows the logical architecture of IMS.
Layer Description
API/Service Serves as the IMS background and the server side of the ECS UI
layer (IMS), and can invoke FusionSphere OpenStack components.
Requests sent by IMS from the console are forwarded by ECS
UI (IMS) to Combined API (IMS) and are returned to ECS UI
(IMS) after being processed by Combined API (IMS).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 391
Huawei Cloud Stack
Solution Description 7 Compute Services
Layer Description
Backend Swift and OBS can be used as the image backend storage.
storage
Workflow
Figure 7-13 shows the workflow for creating an image from an ECS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 392
Huawei Cloud Stack
Solution Description 7 Compute Services
Elastic Cloud Server You can use an image to create an Elastic Cloud
Server (ECS) or convert an ECS to an image.
Bare Metal Server You can create a Bare Metal Server (BMS) using
an image.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 393
Huawei Cloud Stack
Solution Description 7 Compute Services
Tenants in B2B scenarios) as a tenant, click in the upper left corner of the
page, select a region, and select the cloud service.
● API
Use this mode if you need to integrate the cloud service into a third-party
system for secondary development. For details, see API reference of the cloud
service in Image Management Service (IMS) 8.3.0 Usage Guide (for
Huawei Cloud Stack 8.3.0).
Table 7-13 Formats of image files that can be imported and exported to Huawei
Cloud Stack
Platform Image Backend Imported Exported Image
Type Type Storage Image File File Format
Format
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 394
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 395
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 396
Huawei Cloud Stack
Solution Description 7 Compute Services
Image Description
Format
RAW The RAW format is a file that is directly read and written by ECSs.
This format does not support dynamic space expansion and has the
better I/O performance.
OVF Only full-ECS images in the OVF format exported from Huawei
Cloud Stack are supported.
VHD VHD is a virtual disk file format provided by Microsoft. The VHD file
format can be compressed into a single file and stored in the file
system of the host. It mainly contains a file system required for
starting ECSs.
Perform the following steps to obtain the OSs supported by public images:
1. Log in to Huawei Cloud Stack Information Center.
2. Click Learn More under Compatibility Checker to switch to the compatibility query
page.
3. Click the required version to access the Compatibility Query Tool page of the version.
● In the Query Criteria area, select ECS Compute Node under Compute Service,
and click Search. In the Select Product area, select Guest OS to filter the OSs
supported by public images.
● In the Query Criteria area, select BMS Compute Node under Compute Service,
and click Search. In the Select Product area, select BMS Guest OS to filter the
OSs supported by public images.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 397
Huawei Cloud Stack
Solution Description 7 Compute Services
Functions
AS allows users to perform the following operations:
● Manage the AS group lifecycle, including creating, enabling, disabling,
modifying, and deleting an AS group.
● Automatically add instances to or remove them from an AS group based on
configured AS policies.
● Configure the image, specifications, and other configuration information for
implementing scaling actions based on the AS configurations.
● Manage the expected number, minimum number, and maximum number of
instances in an AS group and maintain the expected number of Elastic Cloud
Server (ECS) instances to ensure that services run properly.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 398
Huawei Cloud Stack
Solution Description 7 Compute Services
7.4.2.1 AS Group
An AS group consists of a collection of instances applying to the same application
scenario. It is the basis for enabling or disabling AS policies and performing scaling
actions.
The descriptions of the instance and related concepts are as follows:
● An instance is an ECS in the AS group.
● An AS policy specifies a condition for triggering a scaling action.
The system supports the following AS policies:
– Alarm: AS automatically increases or decreases the number of ECS
instances in an AS group or sets the number of ECS instances to a
specified value if the monitoring system generates an alarm for a
configured indicator, such as the CPU usage.
– Periodic: AS increases or decreases the number of ECS instances in an AS
group or sets the number of ECS instances to a specified value at a
configured interval, such as one day, one week, or one month.
– Scheduled: AS automatically increases or decreases the number of ECS
instances in an AS group or sets the number of ECS instances to a
specified value at a specified time.
7.4.2.2 AS Configuration
An AS configuration is an ECS instance template in the AS group to specify
specifications of the ECSs to be added, including the ECS type, vCPU, memory,
image, disk, and login mode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 399
Huawei Cloud Stack
Solution Description 7 Compute Services
The following describes the expected number of instances and its related concepts.
● Expected Instances specifies the expected number of ECS instances in an AS
group.
● Min. Instances or Max. Instances specifies the minimum or maximum
number of ECS instances in an AS group. The expected number of ECS
instances must fall between the minimum number and maximum number.
● Cooling Duration (s) specifies the duration for cooling a scaling action. The
system begins to count the cooling duration after a scaling action is triggered.
The cooling duration prevents AS from initiating scaling actions triggered by
alarms. The scheduled or periodic scaling actions will not be affected.
7.4.3 Advantages
AS offers the following advantages to your application system:
● Enhanced cost management
AS adds resources to your application system when the access volume
increases and reduces extra resources from the system when the access
volume drops, reducing your cost.
● Improved availability
AS ensures that the application system consistently has a proper resource
capacity to comply with access volume requirements. When AS works with a
load balancer, the AS group automatically adds available instances to the load
balancer listener, through which incoming traffic is evenly distributed across
the instances.
● High error tolerance
AS monitors the instance status in the application system. After detecting an
unhealthy instance, AS replaces it with a new one. In addition, AS evenly
distributes instances to AZs.
● Appropriate number of ECSs
AS ensures that an appropriate number of ECSs handle application loads.
During the creation of an AS group, you can specify the minimum and
maximum numbers of instances in each AS group. After AS policies are
configured, AS increases or reduces the number of ECSs. The number will
never be lower than the minimum value or greater than the maximum value
when application requirements increase or decrease. In addition, you can set
the expected values in the AS group when or after creating the AS group, and
AS ensures that the number of ECSs in the AS group is always the expected
value.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 400
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 401
Huawei Cloud Stack
Solution Description 7 Compute Services
7.4.5 Restrictions
AS has the following restrictions:
● Only applications that are stateless and can be horizontally scaled can run on
ECS instances in an AS group. AS automatically releases ECS instances.
Therefore, the ECS instances in AS groups cannot save application status
information (such as sessions) and related data (such as database data and
logs).
If the application status or related data must be saved, you can store the
information on separate servers.
● Table 7-14 lists the AS service resource quotas.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 402
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 403
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 404
Huawei Cloud Stack
Solution Description 7 Compute Services
Component Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 405
Huawei Cloud Stack
Solution Description 7 Compute Services
Component Description
IMS You can create an ECS using a public image, private image, or
shared image. You can create a private image using an ECS.
VPC VPC provides networks for ECSs. You can use the rich functions of
the VPC to flexibly configure a secure running environment for
ECSs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 406
Huawei Cloud Stack
Solution Description 7 Compute Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 407
Huawei Cloud Stack
Solution Description 8 Storage Services
8 Storage Services
Definition
Elastic Volume Service (EVS) is a virtual block storage service, which provides
block storage space for Elastic Cloud Servers (ECSs) and Bare Metal Servers
(BMSs). You can create EVS disks on the console and attach them to ECSs and
BMSs. The method for using EVS disks is the same as that for using disks on
physical servers. EVS disks have higher data reliability and I/O throughput and are
easier to use. EVS disks are suitable for file systems, databases, or system software
or applications that require block storage devices. Figure 8-1 shows how to use an
EVS disk.
In this document, an EVS disk is also referred to as a disk.
In this document, instances refer to the ECSs or BMSs that you apply for.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 408
Huawei Cloud Stack
Solution Description 8 Storage Services
Functions
EVS provides various persistent storage devices. You can choose disk types based
on your needs and store files and build databases on EVS disks. EVS has the
following major features:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 409
Huawei Cloud Stack
Solution Description 8 Storage Services
Multiple instances can access (read and write) a shared disk at the same time,
meeting the requirements of key enterprises that require cluster deployment
and high availability (HA).
Data access mode Data access is limited within Data access is limited
the internal network of a within the internal
data center. network of a data center.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 410
Huawei Cloud Stack
Solution Description 8 Storage Services
8.1.1.2 Advantages
● Varying specifications
EVS disks of different performance levels are provided. You can choose and
configure EVS disks of appropriate performance levels to meet your service
requirements.
● Scalable
EVS disks provide ultra-large block storage and a single EVS disk has a
maximum capacity of 64 TB. You can expand the EVS disk capacity on running
ECSs to meet your increasing service requirements.
– On-demand expansion
You can expand the capacity of EVS disks based on your needs, with at
least 1 GB added at a time.
– Linear performance improvement
You can expand the capacity of EVS disks on running ECSs to implement
linear performance improvement, thereby meeting your service
requirements.
● Secure and reliable
Distributed storage is adopted, and data is stored in multiple identical copies,
ensuring zero data loss. Data durability reaches 99.9999999%.
● Backup and restoration
Functions, such as EVS disk backup and EVS disk snapshot, are supported to
prevent incorrect data caused by application exceptions or attacks.
– EVS disk backup
This function enables the system to create EVS disk backups. The backups
can be used to roll back EVS disks, maximizing user data accuracy and
security and ensuring service availability.
– EVS disk snapshot
This function enables the system to create snapshots for EVS disks. A
snapshot can be used to roll back an EVS disk to the state when the
snapshot is created, maximizing data accuracy and security and ensuring
service availability.
Relational Database
The service core database needs to support massive access at traffic peaks, and
requires disks with persistent and stable high performance and low latency. You
can use the disk type with ultra-high performance to implement a combination of
excellent performance and superior reliability, meeting the high requirements for
low latency and high I/O performance in data-intensive scenarios, such as
relational databases. Figure 8-2 shows the architecture in these scenarios. Disks
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 411
Huawei Cloud Stack
Solution Description 8 Storage Services
with ultra-high performance service levels can meet the following performance
requirements:
● The latency is shorter than 1 ms.
● The performance ranges from 2000 IOPS/TB to 20,000 IOPS/TB.
● Typical configurations: Enterprise storage OceanStor Dorado5000 V3 is
selected for the storage backend, twenty-five 1 TB, 2 TB, or 4 TB SSDs are
configured for every dual controllers, and RAID 6 is configured. Deduplication
and compression functions are enabled, and a maximum of four controllers
and 50 disks (30 TB, 60 TB, or 120 TB) are configured for a single system.
Data Warehouse
In scenarios with intensive data reads, deploy data warehouses, and it is
recommended that you use the disk type with high performance to meet the
application requirements for low latency, high read and write speed, and large
throughput. Figure 8-3 shows the architecture in these scenarios. Disks with high
performance service levels can meet the following performance requirements:
● The delay ranges from 1 ms to 3 ms.
● The performance ranges from 500 IOPS/TB to 4000 IOPS/TB.
● Typical configuration 1: OceanStor 6800 V5 is selected for the storage
backend, fifty 1.92 TB, 3.84 TB, or 7.68 TB SSDs are configured for every two
controllers, and RAID 5 is configured. A maximum of eight controllers and 200
disks (300 TB, 600 TB, or 1200 TB) are configured for a single system.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 412
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 413
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 414
Huawei Cloud Stack
Solution Description 8 Storage Services
Architecture
EVS includes components such as the EVS console, EVS service API, FusionSphere
OpenStack Cinder, and storage device. Figure 8-6 shows the logical architecture of
EVS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 415
Huawei Cloud Stack
Solution Description 8 Storage Services
Combined API (EVS) The EVS service API encapsulates or combines the
logic based on the native Cinder interface to
implement some EVS functions. The EVS service API
can be invoked by the EVS console or tenants.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 416
Huawei Cloud Stack
Solution Description 8 Storage Services
Workflow
Figure 8-7 shows the workflow for EVS to provision EVS disks and attach the disks
to ECSs.
1. The VDC administrator or VDC operator applies for storage resources on the
EVS console.
2. The EVS console sends the request to Combined API (EVS) through ECS UI
(EVS).
3. Combined API distributes the request to Cinder.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 417
Huawei Cloud Stack
Solution Description 8 Storage Services
4. Cinder creates volumes in the storage pool based on the policy for applying
for storage resources. Cinder includes the following components:
– Cinder API: receives external requests.
– Cinder Scheduler: selects a proper storage backend server and specifies
the storage server where the created volume resides.
– Cinder Volume: connects to various storage device drivers and delivers
requests to specific storage devices.
5. The VDC administrator or VDC operator attaches the requested storage
resources to ECSs on the EVS console.
a. The EVS console sends the request to Combined API (ECS) through ECS
UI (ECS).
b. Combined API distributes the request to Nova.
c. Nova processes the attachment task using Nova-compute running on the
compute node.
6. Nova instructs Cinder to attach EVS disks.
a. Nova obtains EVS disk information and instructs Cinder to reserve EVS
disks.
b. Nova obtains host initiator information and sends it to Cinder.
c. Cinder instructs the storage array to map the initiator and target and
returns the Nova target information.
d. Nova completes the attachment task.
Figure 8-8 Relationship between the EVS service and other cloud services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 418
Huawei Cloud Stack
Solution Description 8 Storage Services
Service Description
Name
ECS You can attach EVS disks to ECSs to provide scalable block
storage.
BMS You can attach SCSI EVS disks to BMSs to provide scalable block
storage.
VBS Volume Backup Service (VBS) can be used to create backups for
EVS disks. EVS disk data can be restored using the backups.
Backups can be used to create EVS disks.
IMS EVS can be used to create data disks from data disk images and
system disks from system disk images.
Image Management Service (IMS) can be used to create data
disk images or system disk images.
Item Metric
Maximum number of EVS This metric is related to the EVS disk quota.
disks that you can obtain ● If the number of EVS disks in the quota is
at a time greater than 100, a maximum number of 100
EVS disks can be applied for each time.
● If the number of EVS disks in a quota is less
than 100, the maximum number of EVS disks
that can be applied for each time is equal to
the quota quantity.
Maximum number of 16
instances to which a If Huawei SAN storage is used as the storage
shared disk can be backend and the storage version is earlier than
attached simultaneously V300R006C50, a shared disk can be attached to
fewer than eight instances simultaneously.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 419
Huawei Cloud Stack
Solution Description 8 Storage Services
8.1.1.7 Restrictions
Before using EVS, learn the restrictions described in Table 8-5.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 420
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 421
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 422
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Attaching ● The ECS supports the attaching of disks in VBD and SCSI modes.
an EVS ● Regardless if a shared EVS disk or non-shared EVS disk is
disk attached to an instance, the EVS disk and the instance must be
in the same AZ.
● Data disks can only be attached to ECSs as data disks. System
disks can be attached to ECSs as system disks or data disks.
● An EVS disk cannot be attached to an instance that has expired.
● An EVS disk cannot be attached to an instance that has been
soft deleted.
● When a disk is attached to an ECS configured with the disaster
recovery (DR) service (CSDR/CSHA/VHA), you must ensure that
the disk is created using the same storage backend as the
existing disk on the ECS.
● An EVS disk with snapshots of a VM can be attached only to the
VM and cannot be attached to any other VM.
● Neither shared EVS disks nor SCSI EVS disks can be attached to
an ECS that has the CSHA service configured.
● If the ECS uses the Windows operating system and the
administrator set Disk Device Type to ide when registering the
image, shut down the ECS before attaching the EVS disk to the
ECS.
● If the ECS to which the EVS disk belongs has not been created,
the EVS disk cannot be attached to another ECS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 423
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 424
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Creating a ● Only disks in the Available or In-use state can be backed up.
backup
Expandin ● When you expand the capacity of a disk online, the instance to
g EVS disk which the disk is attached must be in the Running or Stopped
capacity state.
● Shared EVS disks do not support online capacity expansion, that
is, the capacity of a shared EVS disk can be expanded only when
the disk is in the Available state.
● The capacity of a disk configured with the DR service (CSHA/
CSDR/VHA) cannot be expanded.
● If storage backend is Huawei Distributed Block Storage,
OceanStor V3 V300R006C20 or later, OceanStor V5
V500R007C10 or later, OceanStor 6.1 series, or OceanStor
Dorado V3/6.x series, capacity expansion with snapshots is
supported.
● Capacity expansion is supported when the disk is in the
Available or In-use state.
● Currently, encrypted disks on the host support only offline
capacity expansion.
Changing ● Changing the disk type is supported when the storage backend
the disk is OceanStor V3/V5/6.1, OceanStor Dorado V3/6.x, or Huawei
type Distributed Block Storage.
● If the storage backend is OceanStor V3/V5/6.1, OceanStor
Dorado V3/6.x, or Huawei Distributed Block Storage 8.1.5 or
later, the disk type can be changed between different storage
pools in the same storage system.
● The administrator needs to import the SmartMove license on the
device in advance if the storage backend is Huawei Distributed
Block Storage 8.1.5 or later.
● The administrator needs to import the SmartMigration license
on the device in advance if the storage backend is OceanStor
V3/V5 or OceanStor Dorado V3.
● When changing the disk type, if the storage backend is
OceanStor Dorado 6.x/OceanStor 6.1, the administrator needs to
check whether the SmartMigration license has been imported to
the device in advance. (The basic software package of OceanStor
Dorado 6.x/OceanStor 6.1 contains the SmartMigration license.)
● You can change the type of the EVS disk only in the Available or
In-use state.
● If a disk has snapshots or is configured with the backup service
(VBS/CSBS) or the DR service (CSDR/CSHA/VHA), the disk type
cannot be changed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 425
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Detaching ● ECSs of the KVM virtualization type support online data disk
an EVS detachment, namely, you can detach a data disk from an ECS in
disk Running state. For details about online detachment restrictions,
see "User Guide" > "User Guide (for ECS)" > "Releasing an EVS
Disk" > "Detaching an EVS Disk" in Elastic Volume Service
(EVS) 8.3.0 Usage Guide (for Huawei Cloud Stack 8.3.0).
● System disks cannot be detached online.
● Before detaching a disk online from an instance running
Windows, log in to the instance to perform the offline operation
and confirm that VirtIO driver has been installed on the ECS and
is running properly. At the same time, ensure that this disk is not
being read or written. Otherwise, the disk will fail to be
detached.
● Before detaching a disk online from an instance running Linux,
log in to the instance, run the umount command to cancel the
relationship between the disk and the file system, and confirm
that the disk is not being read and written. Otherwise, the disk
will fail to be detached.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 426
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 427
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 428
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 429
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 430
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 431
Huawei Cloud Stack
Solution Description 8 Storage Services
Tenants in B2B scenarios) as a tenant, click in the upper left corner of the
page, select a region, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see "API reference" of this service in
Elastic Volume Service (EVS) 8.3.0 Usage Guide (for Huawei Cloud Stack
8.3.0).
Definition
Elastic Volume Service (EVS) is a virtual block storage service, which provides
block storage space for Elastic Cloud Servers (ECSs) and Bare Metal Servers
(BMSs). You can create EVS disks on the console and attach them to ECSs. The
method for using EVS disks is the same as that for using disks on physical servers.
EVS disks have higher data reliability and I/O throughput and are easier to use.
EVS disks are suitable for file systems, databases, or system software or
applications that require block storage devices. Figure 8-9 shows how to use an
EVS disk.
In this document, an EVS disk is also referred to as a disk.
In this document, instances refer to the ECSs or BMSs that you apply for.
Functions
EVS provides various persistent storage devices. You can choose disk types based
on your needs and store files and build databases on EVS disks. EVS has the
following major features:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 432
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 433
Huawei Cloud Stack
Solution Description 8 Storage Services
Data access mode Data access is limited within Data access is limited
the internal network of a within the internal
data center. network of a data center.
8.1.2.2 Advantages
● Varying specifications
EVS disks of different performance levels are provided. You can choose and
configure EVS disks of appropriate performance levels to meet your service
requirements.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 434
Huawei Cloud Stack
Solution Description 8 Storage Services
● Scalable
EVS disks provide ultra-large block storage and a single EVS disk has a
maximum capacity of 64 TB. You can expand the EVS disk capacity on running
ECSs to meet your increasing service requirements.
– On-demand expansion
You can expand the capacity of EVS disks based on your needs, with at
least 1 GB added at a time.
– Linear performance improvement
You can expand the capacity of EVS disks on running ECSs to implement
linear performance improvement, thereby meeting your service
requirements.
● Secure and reliable
Distributed storage is adopted, and data is stored in multiple identical copies,
ensuring zero data loss. Data durability reaches 99.9999999%.
● Backup and restoration
Functions, such as EVS disk backup and EVS disk snapshot, are supported to
prevent incorrect data caused by application exceptions or attacks.
– EVS disk backup
This function enables the system to create EVS disk backups. The backups
can be used to roll back EVS disks, maximizing user data accuracy and
security and ensuring service availability.
– EVS disk snapshot
This function enables the system to create snapshots for EVS disks. A
snapshot can be used to roll back an EVS disk to the state when the
snapshot is created, maximizing data accuracy and security and ensuring
service availability.
Relational Database
The service core database needs to support massive access at traffic peaks, and
requires disks with persistent and stable high performance and low latency. You
can use the disk type with ultra-high performance to implement a combination of
excellent performance and superior reliability, meeting the high requirements for
low latency and high I/O performance in data-intensive scenarios, such as NoSQL
and relational databases. Figure 8-10 shows the architecture in these scenarios.
Disks with ultra-high performance service levels can meet the following
performance requirements:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 435
Huawei Cloud Stack
Solution Description 8 Storage Services
Data Warehouse
In scenarios with intensive data reads, deploy data warehouses, and it is
recommended that you use the disk type with high performance to meet the
application requirements for low latency, high read and write speed, and large
throughput. Figure 8-11 shows the architecture in these scenarios. Disks with high
performance service levels can meet the following performance requirements:
● The delay ranges from 1 ms to 3 ms.
● The performance ranges from 500 IOPS/TB to 4000 IOPS/TB.
● Typical configuration 1: OceanStor 6800 V5 is selected for the storage
backend, fifty 1.92 TB, 3.84 TB, or 7.68 TB SSDs are configured for every dual-
controller, and RAID 5 is configured. A maximum of eight controllers and 200
disks (300 TB, 600 TB, or 1200 TB) are configured for a single system.
● Typical configuration 2: Huawei Distributed Block Storage is selected for the
storage backend. RH2288H V5 servers are used. Twelve 4 TB, 6 TB, 8 TB, or 10
TB SATA disks are configured. Three-duplicate mode is adopted. One 1.6 TB or
3.2 TB SSD is configured. The total available space on each node is about 15.2
TB, 22.8 TB, 30.4 TB, or 38 TB.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 436
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 437
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 438
Huawei Cloud Stack
Solution Description 8 Storage Services
Architecture
EVS includes components such as the EVS console, EVS service API, FusionSphere
OpenStack Cinder, and storage device. Figure 8-14 shows the logical architecture
of EVS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 439
Huawei Cloud Stack
Solution Description 8 Storage Services
Combined API (EVS) The EVS service API encapsulates or combines the
logic based on the native Cinder interface to
implement some EVS functions. The EVS service API
can be invoked by the EVS console or tenants.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 440
Huawei Cloud Stack
Solution Description 8 Storage Services
Workflow
Figure 8-15 shows the workflow for EVS to provision EVS disks and attach EVS
disks to BMSs.
1. The VDC administrator or VDC operator applies for storage resources on the
EVS console.
2. The EVS console sends the request to Combined API (EVS) through ECS UI
(EVS).
3. Combined API distributes the request to Cinder.
4. Cinder creates volumes in the storage pool based on the policy for applying
for storage resources. Cinder includes the following components:
– Cinder API: receives external requests.
– Cinder Scheduler: selects a proper storage backend server and specifies
the storage server where the created volume resides.
– Cinder Volume: connects to various storage device drivers and delivers
requests to specific storage devices.
5. The VDC administrator or VDC operator attaches the requested storage
resources to BMSs on the EVS console.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 441
Huawei Cloud Stack
Solution Description 8 Storage Services
a. The EVS console sends the request to Combined API (BMS) through ECS
UI (BMS).
b. Combined API distributes the request to Nova.
6. Nova instructs Cinder to attach EVS disks.
a. Nova obtains EVS disk information and instructs Cinder to reserve EVS
disks.
b. Nova uses the Ironic driver and ironic-agent to obtain information about
the initiator of the physical machine.
c. Nova transmits initiator information to Cinder.
d. Cinder instructs the storage array to map the initiator and target and
returns the Nova target information.
e. Nova completes the attachment task.
Figure 8-16 Relationship between the EVS service and other cloud services
Service Description
Name
ECS You can attach EVS disks to ECSs to provide scalable block
storage.
BMS You can attach SCSI EVS disks to BMSs to provide scalable block
storage.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 442
Huawei Cloud Stack
Solution Description 8 Storage Services
Service Description
Name
VBS Volume Backup Service (VBS) can be used to create backups for
EVS disks. EVS disk data can be restored using the backups.
Backups can be used to create EVS disks.
IMS EVS can be used to create data disks from data disk images and
system disks from system disk images.
Image Management Service (IMS) can be used to create data
disk images or system disk images.
Maximum number of EVS This metric is related to the EVS disk quota.
disks that you can obtain ● If the number of EVS disks in the quota is
at a time greater than 100, a maximum number of 100
EVS disks can be applied for each time.
● If the number of EVS disks in a quota is less
than 100, the maximum number of EVS disks
that can be applied for each time is equal to
the quota quantity.
Maximum number of 16
instances to which a If Huawei SAN storage is used as the storage
shared disk can be backend and the storage version is earlier than
attached simultaneously V300R006C50, a shared disk can be attached to
fewer than eight instances simultaneously.
8.1.2.7 Restrictions
Before using EVS, learn the restrictions described in Table 8-10.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 443
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 444
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 445
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Creating ● Only disks in the Available or In-use state can be backed up.
a backup
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 446
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Expandin ● When you expand the capacity of a disk online, the instance to
g the which the disk is attached must be in the Running or Stopped
capacity state.
of an EVS ● Shared EVS disks do not support online capacity expansion, that
disk is, the capacity of a shared EVS disk can be expanded only when
the disk is in the Available state.
● The capacity of a disk configured with the disaster recovery
service (CSHA, CSDR, or VHA) cannot be expanded.
● If storage backend is Huawei Distributed Block Storage,
OceanStor V3 V300R006C20 or later, OceanStor V5
V500R007C10 or later, OceanStor 6.1 series, or OceanStor
Dorado V3/6.x series, capacity expansion with snapshots is
supported.
● Capacity expansion is supported when the disk is in the
Available or In-use state.
● Currently, encrypted disks on the host support only offline
capacity expansion.
Changing ● Changing the disk type is supported when the storage backend is
the disk OceanStor V3/V5/6.1, OceanStor Dorado V3/6.x, or Huawei
type Distributed Block Storage.
● If the storage backend is OceanStor V3/V5/6.1, OceanStor
Dorado V3/6.x, or Huawei Distributed Block Storage 8.1.5 or
later, the disk type can be changed between different storage
pools in the same storage system.
● The administrator needs to import the SmartMove license on the
device in advance if the storage backend is Huawei Distributed
Block Storage 8.1.5 or later.
● The administrator needs to import the SmartMigration license
on the device in advance if the storage backend is OceanStor
V3/V5 or OceanStor Dorado V3.
● When changing the disk type, if the storage backend is
OceanStor Dorado 6.x/OceanStor 6.1, the administrator needs to
check whether the SmartMigration license has been imported to
the device in advance. (The basic software package of OceanStor
Dorado 6.x/OceanStor 6.1 contains the SmartMigration license.)
● You can change the type of the EVS disk only in the Available or
In-use state.
● If a disk has snapshots or is configured with the backup service
(VBS or CSBS) or the disaster recovery service (CSDR, CSHA, or
VHA), the disk type cannot be changed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 447
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Detaching ● Data disks can be detached online, that is, data disks can be
an EVS detached from BMSs in the running state.
disk ● Before detaching a disk online from an instance running
Windows, log in to the instance to perform the offline operation
and confirm that the disk is not being read and written.
Otherwise, the disk will fail to be detached.
● Before detaching a disk online from an instance running Linux,
log in to the instance, run the umount command to cancel the
relationship between the disk and the file system, and confirm
that the disk is not being read and written. Otherwise, the disk
will fail to be detached.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 448
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 449
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Restrictions
● Web UI
Log in to ManageOne Operation Portal (ManageOne Operation Portal for
Tenants in B2B scenarios) as a tenant, click in the upper left corner of the
page, select a region, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see "API reference" of this service in
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 450
Huawei Cloud Stack
Solution Description 8 Storage Services
Elastic Volume Service (EVS) 8.3.0 Usage Guide (for Huawei Cloud Stack
8.3.0).
Definition
Scalable File Service (SFS) provides Elastic Cloud Servers (ECSs) and Bare Metal
Servers (BMSs) in high-performance computing (HPC) scenarios with a high-
performance shared file system that can be scaled on demand. It is compatible
with standard file protocols (NFS, CIFS, and DPC) and is scalable to petabytes of
capacity to meet the needs of massive amounts of data and bandwidth-intensive
applications. Figure 8-17 describes how to use SFS.
Functions
SFS provides the following functions:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 451
Huawei Cloud Stack
Solution Description 8 Storage Services
Data access mode Data access is limited within Data access is limited
the internal network of a within the internal
data center. network of a data center.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 452
Huawei Cloud Stack
Solution Description 8 Storage Services
NFS
Network File System (NFS) is a distributed file system protocol that allows
different computers and operating systems to share data over a network.
CIFS
Common Internet file system (CIFS) is a protocol used for network file access. CIFS
is an open SMB protocol version that allows programs to access files on remote
computers over Internet and requires the computers to provide services. Through
the CIFS protocol, network files can be shared between hosts running Windows.
File System
A file system provides users with shared file storage service through NFS, CIFS, or
DPC. It can be used to access network files remotely. After users create shared
directories in the management console, the file system can be mounted to
multiple ECSs and is accessible through the standard POSIX interface.
Storage SLA
A storage Service Level Agreement (SLA) is a group of service capabilities that can
be selected when you apply for file storage resources. You can apply for a file
system based on the SLA.
VPC
Virtual Private Cloud (VPC) enables you to provision logically isolated,
configurable, and manageable virtual networks for ECSs, improving the security of
resources in the system and simplifying network deployment.
You can select IP address ranges, create subnets, customize security groups, and
configure route tables and gateways in a VPC, which enables you to manage and
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 453
Huawei Cloud Stack
Solution Description 8 Storage Services
configure your network conveniently and modify your network securely and
rapidly. You can also customize access rules and firewalls to control ECS access
within a security group and across different security groups to enhance security of
ECSs in the subnet.
In addition, you can create a Virtual Private Network (VPN) between the
enterprise data center or private network and the VPC without using an external
IP address for port forwarding.
HPC
HPC is a computer cluster system that connects computer systems using
interconnection technologies. It relies on the integrated compute capability of all
the connected systems to execute computing tasks at scale. For this reason, HPC is
also referred to as an HPC cluster.
DPC
Distributed Parallel Client (DPC) runs on compute nodes as a storage client and
exchanges data with storage backend nodes over a network protocol.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 454
Huawei Cloud Stack
Solution Description 8 Storage Services
Media Processing
SFS with high bandwidth and large capacity enables shared file storage for video
editing, transcoding, composition, high-definition video, and 4K video on demand,
satisfying multi-layer HD video and 4K video editing requirements.
Figure 8-19 shows the architecture of the media processing scenario.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 455
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 456
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 457
Huawei Cloud Stack
Solution Description 8 Storage Services
Infrastructur Storage device File storage device that provides file system
e storage space for the SFS.
The following storage devices are supported:
OceanStor 9000, OceanStor Dorado 6.x,
OceanStor 6.x, and OceanStor Pacific series.
Workflow
Figure 8-21 shows the SFS workflow.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 458
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 459
Huawei Cloud Stack
Solution Description 8 Storage Services
Cloud Description
Service
Name
BMS In HPC scenarios, file systems can be mounted to BMSs for data
sharing.
Item Specifications
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 460
Huawei Cloud Stack
Solution Description 8 Storage Services
Item Specifications
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 461
Huawei Cloud Stack
Solution Description 8 Storage Services
File system ● Before deleting a file system, ensure that the file system
deletion has been successfully detached from the ECS.
● By default, a file system is soft deleted and moved to the
recycle bin. The file system still occupies the quota. You
can restore or permanently delete the file system from
the recycle bin.
● A file system removed to the recycle bin has a frozen
period of 24 hours by default. The file system cannot be
permanently deleted within the frozen period.
● If you delete a newly created file system, an error will be
reported. In this case, wait 5 to 10 minutes and then
delete the file system again.
File system Currently, orders can be executed only in one region for
management cross-region active-active file systems. If orders are executed
in both regions for the same active-active file system at the
same time, the orders in one region will fail to be executed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 462
Huawei Cloud Stack
Solution Description 8 Storage Services
scenarios) as a tenant, click in the upper left corner of the page, select a
region, and select the cloud service.
● API
If you want to integrate the cloud service into a third-party system for
secondary development, you can access the cloud service using API. For
details, see "API Reference" in Scalable File Service (SFS) 8.3.0 Usage Guide
(for Huawei Cloud Stack 8.3.0).
8.3.2 Advantages
Comparison Between OBS and On-Premises Storage Servers
In this information era, it becomes increasingly difficult for conventional on-
premises storage servers to deal with the fast growing data of enterprises. Table
8-16 compares OBS with on-premises storage servers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 463
Huawei Cloud Stack
Solution Description 8 Storage Services
Security OBS uses HTTPS and SSL The owner and users are exposed
protocols and encrypts data to security risks from cyber
during uploads. To keep data attacks, technical vulnerabilities,
transmission and access safe, and accidental operations.
OBS uses access key IDs (AKs)
and secret access keys (SKs)
to authenticate user identities
and adopts bucket policies,
access control lists (ACLs),
and uniform resource locator
(URL) validation.
OBS Advantages
● Data durability and service continuity: OBS supports access of hundreds of
millions of users.
● Multi-level protection and authorization management: Measures,
including versioning, server-side encryption, URL validation, virtual private
cloud (VPC)-based network isolation, access log audit, and fine-grained access
control are provided to keep data secure and trusted.
● 100-billion level objects, 10-million level concurrency: With intelligent
scheduling and response, optimized data access paths, and technologies such
as transmission acceleration, and big data vertical optimization, you can store
hundreds of billions of objects in OBS, and still experience smooth
concurrency, ultra-high bandwidth, and low latency.
● Easy use and management: OBS provides standard REST APIs to help you
quickly move your workloads to cloud. Storage resources are linearly, infinitely
scalable, without compromising performance. You do not have to plan storage
capacity beforehand or worry about expansion or reduction.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 464
Huawei Cloud Stack
Solution Description 8 Storage Services
OBS can be used for video surveillance, video on demand (VOD), backup and
archive, high-performance computing (HPC), enterprise cloud boxes (web disks),
and many other scenarios.
Tool Description
OBS Console OBS Console is a web-based GUI for you to easily manage
OBS resources.
OBS Browser+ OBS Browser+ is a Windows or Mac client that lets you
easily manage OBS resources from your desktop.
API OBS offers the REST API for you to access it from web
applications with ease. By making API calls, you can upload
and download data anytime, anywhere.
OBS can be used as the storage resource pool for other cloud services such as
Image Management Service (IMS).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 465
Huawei Cloud Stack
Solution Description 8 Storage Services
8.3.6.1 Objects
Objects are basic units stored in OBS. An object contains both data and the
metadata that describes data attributes. Data uploaded to OBS is stored in
buckets as objects.
On OBS Console, you can use folders the same way you use them in a file system.
8.3.6.2 Buckets
Buckets are containers for storing objects. OBS provides flat storage in the form of
buckets and objects. Unlike the conventional multi-layer directory structure of file
systems, all objects in a bucket are stored at the same logical layer.
Each bucket has its own attributes, such as access permissions, and the region. You
can specify access permissions, and regions when creating buckets. You can also
configure advanced attributes to meet storage requirements in different scenarios.
Each bucket name in OBS is globally unique and cannot be changed after the
bucket has been created. The region where a bucket resides cannot be changed
once the bucket is created. When you create a bucket, OBS creates a default
access control list (ACL) that grants users permissions (such as read and write
permissions) on the bucket. Only authorized users can perform operations such as
creating, deleting, viewing, and configuring buckets.
A tenant can create a maximum of 100 buckets and parallel file systems. However,
there is no restriction on the number and total size of objects in a bucket.
OBS adopts the REST architectural style, and is based on HTTP and HTTPS. You
can use URLs to locate resources.
Figure 8-23 illustrates the relationship between buckets and objects in OBS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 466
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 467
Huawei Cloud Stack
Solution Description 8 Storage Services
Bucket domain name: Each bucket in OBS has a domain name. A domain name
is the address of a bucket and can be used to access the bucket. It is applicable to
cloud application development and data sharing.
Table 8-19 lists the bucket domain name and other domain names in OBS,
including their structure and protocols.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 468
Huawei Cloud Stack
Solution Description 8 Storage Services
Concept
A region and availability zone (AZ) identify the location of a data center. You can
create resources in a specific region and AZ.
● A region is a physical data center. Each region is completely independent,
improving fault tolerance and stability. After a resource is created, its region
cannot be changed.
● An AZ is a physical location using independent power supplies and networks.
Faults in an AZ do not affect other AZs. A region can contain multiple AZs,
which are physically isolated but interconnected through internal networks.
This ensures the independence of AZs and provides low-cost and low-latency
network connections.
Figure 8-24 shows the relationship between the regions and AZs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 469
Huawei Cloud Stack
Solution Description 8 Storage Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 470
Huawei Cloud Stack
Solution Description 9 Network Services
9 Network Services
Network Scheme
Software is used to implement network virtualization and software switches are
used to provide network services.
Functions
● Configuring private networks as required
You can configure CIDR blocks for subnets in your VPC, and then deploy cloud
servers and services in the subnets as required.
By configuring custom route policies, you can flexibly manage network traffic
forwarding of resources such as VPCs, public networks, and hybrid clouds. For
details, see Figure 9-1.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 471
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 472
Huawei Cloud Stack
Solution Description 9 Network Services
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 473
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 474
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 475
Huawei Cloud Stack
Solution Description 9 Network Services
– You can use network ACLs to restrict access to subnets, filtering incoming
and outgoing traffic for the security purpose. For details, see Figure 9-8.
9.1.2.1 Subnet
A subnet is a CIDR block in a VPC, and subnets in a VPC are on the Layer 3
network. You can create multiple subnets in a VPC and place cloud servers with
the same service requirements into the same subnet. You can use a subnet to
manage cloud servers, including managing their IP addresses and providing the
DNS service for them.
By default, cloud servers in all subnets of the same VPC can communicate with
one another, while cloud servers in different VPCs cannot communicate with one
another.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 476
Huawei Cloud Stack
Solution Description 9 Network Services
9.1.2.4 NIC
Virtual NICs can be either primary or extension NICs. You can attach NICs to your
ECSs or BMSs to build flexible, high availability networks.
● Primary NIC: A primary NIC is created together with a cloud server instance
by default, and cannot be detached from the cloud server instance.
● Extension NIC: An extension NIC can be created and attached to a cloud
server instance, and can be detached from the cloud server instance. The
number of extension NICs that you can attach to an instance varies by
instance specifications.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 477
Huawei Cloud Stack
Solution Description 9 Network Services
to multiple security groups and access other cloud servers in its each security
group.
Each VPC must be associated with a route table, which consists of routes. Routes
are classified into the following types:
● System routes: Routes that are automatically generated by the system, such
as routes in the public service zone and direct routes of VPC subnets
● Routes generated during service configuration: routes generated during Direct
Connect, VPN, Cloud Connect, and VPC Peering configuration, default routes
generated during NAT Gateway configuration, and default EIP routes
The longest prefix match is supported between different types of routes with the
same priority. The route with the longest mask is matched first.
9.1.2.10 VPN
A VPN establishes an encrypted communication tunnel between a remote user
and a VPC, enabling the remote user to use service resources in the VPC through
the VPN.
By default, cloud servers in a VPC cannot communicate with your data center or
private network. To enable communication between them, you can create a VPN.
In a given region, you can create a VPC peering connection between two VPCs in
your resource space, or between a VPC in your resource space and a VPC in
another resource space. VPCs can belong to different tenants.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 478
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 479
Huawei Cloud Stack
Solution Description 9 Network Services
9.1.2.16 L2BR
Layer 2 Bridge (L2BR) enables high-speed and secure Layer 2 communication
between a VPC and an on-premises IP address range. If the CIDR block of a VPC
subnet and an on-premises IP address range belong to the same IP address range,
L2BR can enable Layer 2 communication between the VPC subnet and the on-
premises IP address range. If the CIDR block of a VPC subnet and an on-premises
IP address range belong to different IP address ranges, L2BR can enable Layer 3
communication between them. With L2BR, you can deploy a service in both a
cloud network and an on-premises network whose IP address ranges belong to a
same IP address range. In addition, you can migrate a service to the cloud without
the need to change the IP address range configured for the service.
9.1.2.17 Multicast
The multicast service forwards multicast traffic based on L2BR. The multicast
source can be in the cloud, and the requester can be outside the cloud, between
VPCs in the cloud, or in a VPC. It can also be used in the scenario where the
multicast source is outside the cloud and the requester is in the cloud.
9.1.3 Advantages
With a VPC, you can easily manage and configure internal networks, and you can
rapidly modify network configurations in a secure manner.
● Flexible network deployment: You can configure networks and deploy routes
as required, and a visualized network topology is provided. Therefore, you
have complete control over your private networks.
● Secure and reliable network: The network is fully and logically isolated from
external networks. You can configure your desired access rules for the
network to improve security.
● Various network connections: The VPC supports various network connections,
which meet your cloud service requirements in a flexible and efficient manner.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 480
Huawei Cloud Stack
Solution Description 9 Network Services
You can place multi-tier web applications into different security zones, and
configure access control rules for each security zone as required. For example, you
can create two VPCs, add web servers to one VPC, and add database servers to
the other. Then, you can create security groups and network ACLs for the two
VPCs and configure inbound and outbound rules so that the web servers can
communicate with the extranet while the database servers cannot communicate
with the extranet. The purpose is to achieve security protection on database
servers, meeting high security requirements. You can use a VPC peering
connection to connect the two VPCs so that the web servers can communicate
with the database servers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 481
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 482
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 483
Huawei Cloud Stack
Solution Description 9 Network Services
9.1.6 Restrictions
Table 9-2 lists the restrictions on the functions and features of the VPC service.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 484
Huawei Cloud Stack
Solution Description 9 Network Services
Function or Restriction
Feature
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 485
Huawei Cloud Stack
Solution Description 9 Network Services
Function or Restriction
Feature
L2BR ● Only one L2BR instance can be created for each VPC subnet.
● CSHA and management plane HA are not supported.
VPC Peering ● A VPC peering connection can be created between two VPCs
in a region. VPCs can belong to different tenants.
● Only one VPC peering connection can be created between
two VPCs.
● A VPC peering connection is actually used to connect two
CIDR blocks in the two VPCs. Ensure that the two CIDR
blocks do not overlap.
● After a VPC peering connection is created, you need to
create routes for the local and peer VPCs to enable
communications between the two VPCs.
● You can add multiple routes for a VPC peering connection.
To enable communications between multiple local subnets
and multiple peer subnets in two VPCs, you only need to
add more routes without the need to add more VPC peering
connections.
● After a VPC peering connection is created between two
subnets, one subnet can access resources in the other
subnet, including cloud servers, databases, and load
balancers.
● Peering relationships are not transitive. For example, even if
there are peering connections between VPC 1 and VPC 2
and between VPC 2 and VPC 3, those connections do not
enable communications between VPC 1 and VPC 3.
● The VPC peering connection is supported on both IPv4 and
IPv6 networks. When adding routes for the local and peer
ends of a VPC peering connection, ensure that the routes are
of the same network type.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 486
Huawei Cloud Stack
Solution Description 9 Network Services
Function or Restriction
Feature
VPC Flow Log ● VPC flow logs must be used together with Log Tank Service
(LTS) for log analysis. Therefore, you must deploy AOM LTS
before deploying VPC flow logs.
● By default, a user can create a maximum of 10 VPC flow
logs.
● By default, a maximum of 400,000 flow log records are
supported.
● Centralized bare metal gateways do not support VPC flow
logs.
● If an ECS is in the stopped state, its flow log records will not
be displayed.
● The Arm kernel mode does not support VPC flow logs.
Elastic Cloud Server A VPC will be bound to its associated ECSs or BMSs.
(ECS)/Bare Metal
Server (BMS)
Elastic Load Balance The ELB service distributes access traffic to multiple
(ELB) ECSs in a VPC.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 487
Huawei Cloud Stack
Solution Description 9 Network Services
Service Description
● Web UI
Log in to ManageOne Operation Portal (ManageOne Tenant Portal in B2B
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Virtual Private Cloud (VPC) 8.3.0 Usage Guide (for Huawei Cloud Stack
8.3.0).
Definition
An elastic IP address (EIP) is a static IP address on extranet (this extranet can be
the Internet or an internal LAN of an enterprise), can be directly accessed through
the Internet, and is mapped to the instance bound with the EIP using NAT.
All IP addresses configured for instances in a local area network (LAN) are private
IP addresses, which cannot be used for extranet access. To enable applications on
an instance in a VPC to access the extranet, bind an EIP to the instance, which will
allow the instance to access the extranet using a fixed extranet IP address.
An EIP can be bound to or unbound from a virtual private cloud (VPC) resource,
such as an elastic cloud server (ECS), bare metal server (BMS), virtual IP address,
or elastic load balancer in a VPC subnet. A VPC resource bound with an EIP can
use the EIP to communicate with the extranet, but the EIP is not exposed on the
resource.
Network Scheme
Software is used to convert extranet and private IP addresses into each other.
Functions
● Binding an extranet IP address as required
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 488
Huawei Cloud Stack
Solution Description 9 Network Services
The EIP enables you to access the extranet flexibly and with a high
performance. You can apply for an independent extranet IP address, and then
bind it to an ECS to allow the ECS to access the extranet. The binding and
unbinding operations take effect immediately.
● Setting the bandwidth limit
When applying for an extranet IP address, you can set the bandwidth limit for
it.
● Existing independently
The EIP will not be applied together with any compute or storage resource as
a bundle. The EIP is an independent resource.
● Applying for EIPs in batches
You can apply for multiple EIPs at a time.
● Manually specifying an EIP or automatically allocating an EIP
When applying for an EIP, you can choose to manually specify one or
automatically allocate one. When you choose to manually specify one, enter
an idle IP address.
● Specifying a required duration
When applying for an EIP, you can specify a required duration for it based on
your service requirements. The required duration ranges from days to an
unlimited period.
Billing rule
EIP billing factor: required duration of the EIP
NOTICE
In HUAWEI CLOUD Stack 8.1.0, a new EIP billing mode is added. In the new mode,
you are billed by the actual data traffic usage in real time.
To ensure billing stability, you are advised to use the original EIP billing mode, that
is, you are billed by the required duration of the EIP.
The shared bandwidth can be shared and multiplexed at the region level. This
enables all ECSs, BMSs, or load balancers bound with multiple EIPs to share the
bandwidth configured for the EIPs. These ECSs, BMSs, or load balancers must
belong to the same tenant and the same resource space.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 489
Huawei Cloud Stack
Solution Description 9 Network Services
The VIP is used for active/standby cloud server switchover to achieve high
availability (HA). A VIP can be bound to multiple cloud servers deployed in active/
standby mode. You can bind the VIP with an EIP so that you can access the cloud
servers that have the same VIP bound from external networks to improve DR
performance.
9.2.2.3 EIP-Metering
EIP-Metering is an optional cloud service independently deployed on a VM. It
monitors tenant EIP traffic and bandwidth in real time and displays EIP inbound
and outbound traffic, inbound and outbound bandwidth, and outbound network
usage of a tenant on the tenant VPC console and ManageOne Maintenance
Portal. The system pre-configures outbound bandwidth usage threshold alarms.
You can also customize threshold as required.
NOTICE
9.2.3 Advantages
EIPs are used to enable cloud resources to be accessed from the Internet. EIPs can
be bound to or unbound from various service resources to meet different service
requirements.
● You can bind an EIP to an ECS or BMS to enable extranet access for the ECS
or BMS.
● You can bind a virtual IP address with an EIP so that you can access the ECSs
that have the same virtual IP address bound from the extranet, improving
fault tolerance capabilities.
● You can bind an EIP to a load balancer so that the load balancer receives
access requests from the extranet and automatically distributes the access
requests to specified multiple ECSs.
With the shared bandwidth, multiple instances can share one bandwidth.
Therefore, you can add instances without high bandwidth requirements to a
shared bandwidth.
● Multiple EIPs can share one bandwidth. The shared bandwidth helps lower
bandwidth costs compared with the dedicated bandwidth.
As shown in Figure 9-14, three EIPs with dedicated bandwidth (8 Mbit/s, 5
Mbit/s, and 7 Mbit/s) are used. The total cost equals 20 Mbit/s bandwidth
cost. As shown in Figure 9-15, the three EIPs are added to the same shared
bandwidth to meet the bandwidth requirements of three peak hours. The
total cost is less than 12 Mbit/s bandwidth cost.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 490
Huawei Cloud Stack
Solution Description 9 Network Services
● The shared bandwidth can be shared and multiplexed at the project level,
which lowers bandwidth usage costs and O&M costs.
● The shared bandwidth has a wide size range, and you can adjust the
bandwidth size anytime as required.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 491
Huawei Cloud Stack
Solution Description 9 Network Services
Using an EIP and a NAT Gateway to Let Cloud Servers in a VPC Access the
Extranet
To let multiple cloud servers in a VPC access the extranet, use an EIP and a NAT
gateway.
Create a NAT gateway. Create a SNAT rule. Add the target EIP and the target
subnet to the SNAT rule to let the cloud servers in the subnet access the extranet
over the EIP. For details, see "NAT Gateway" in Virtual Private Cloud (VPC) 8.3.0
User Guide (for Huawei Cloud Stack 8.3.0) in Virtual Private Cloud (VPC) 8.3.0
Usage Guide (for Huawei Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 492
Huawei Cloud Stack
Solution Description 9 Network Services
9.2.5 Restrictions
Before using EIPs, learn the restrictions described in Table 9-4.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 493
Huawei Cloud Stack
Solution Description 9 Network Services
Item Restrictions
Bare Metal Server (BMS) A NIC of a BMS can be bound to an EIP. In this
case, the BMS is associated with the EIP.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 494
Huawei Cloud Stack
Solution Description 9 Network Services
Elastic Load Balance (ELB) The IP address of an elastic load balancer can be
bound to an EIP. In this case, the elastic load
balancer is associated with the EIP.
Cloud Firewall (CFW) CFW 2.0 instances can be bound to EIPs for EIP
security.
● Web UI
Log in to ManageOne Operation Portal (ManageOne Tenant Portal in B2B
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Elastic IP (EIP) 8.3.0 Usage Guide (for Huawei Cloud Stack 8.3.0).
Definition
Elastic Load Balance (ELB) is a service that automatically distributes incoming
traffic across multiple backend cloud servers based on predefined forwarding
policies. ELB can expand the access handling capability of application systems
through traffic distribution and achieve a higher level of fault tolerance and
performance. ELB also improves system availability by eliminating single points of
failure (SPOF). In addition, ELB supports centralized deployment of internal and
external networks. It also allows access through VPNs, Direct Connect connections,
and across VPCs.
You can create a load balancer on a web-based console and configure cloud
servers and service monitoring ports.
Functions
ELB provides a way to configure load balancing capability. A self-service web-
based console is provided for you to easily configure the service and quickly spin
up more capacity for load balancing.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 495
Huawei Cloud Stack
Solution Description 9 Network Services
9.3.2.1 Listener
A listener is a process that checks for connection requests using a protocol and
port for connections from clients to the load balancer, and a protocol and port for
connections from the load balancer to backend cloud servers.
● Weighted round robin: Requests are distributed across backend cloud servers
in sequence. This algorithm does not need to record the status of each
connection. Thus it is a stateless scheduling algorithm. This algorithm applies
to server groups in which all the servers have the same hardware and
software configuration and the average number of service requests do not
change sharply.
● Weighted least connections: In contrast to the round robin algorithm, this
algorithm estimates the server load based on the number of active
connections on the server and preferentially distributes requests to the
backend cloud server that has the least connections.
● Source IP hash: The source IP address of each request is calculated using the
hash algorithm to obtain a unique hash key, and all backend servers are
numbered. The generated key allocates the client to a particular server. This
enables requests from different clients to be routed and ensures that a client
is directed to the same server that it was using previously.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 496
Huawei Cloud Stack
Solution Description 9 Network Services
TCP and UDP support only sticky sessions of the source IP address type. If HTTP or
HTTPS is used as the frontend protocol, the sticky session type can be HTTP cookie or
app cookie. You can choose an appropriate algorithm based on your requirement to
distribute access traffic and improve load balancing capabilities.
Stickiness Duration
● The maximum stickiness duration of a source IP address-based session is 1
hour.
● The maximum stickiness duration of an HTTP cookie-based session is 24
hours.
● The stickiness duration of an application cookie-based session is fixed at 24
hours.
9.3.2.5 Certificate
This section describes how to manage HTTPS certificates. You can upload a
certificate and bind it to an HTTPS listener to provide the HTTPS or TCP service.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 497
Huawei Cloud Stack
Solution Description 9 Network Services
the load balancer sends full share of requests to backend servers and exits the
slow start mode.
Slow start gives applications time to warm up and respond to requests with
optimal performance.
Backend servers will exit slow start in either of the following cases:
9.3.3 Advantages
ELB has the following advantages:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 498
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 499
Huawei Cloud Stack
Solution Description 9 Network Services
Capacity Expansion
For applications featuring unpredictable and large fluctuations in demand, for
example, video or e-commerce websites, ELB can automatically scale their
capacities. The backend cloud server group can work with AS to ensure smooth
and stable operations while minimizing the costs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 500
Huawei Cloud Stack
Solution Description 9 Network Services
9.3.5 Restrictions
Before using ELB, learn the restrictions in Table 9-6.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 501
Huawei Cloud Stack
Solution Description 9 Network Services
Item Restrictions
Slow start ● Only HTTP and HTTPS backend server groups support
slow start.
● Slow start takes effect only when the weighted round
robin algorithm is used.
● If there is no backend server in a backend server group
when slow start is enabled for it, newly added
backend servers will not enter the slow start mode.
● If there are backend servers in a backend server group
when slow start is enabled for it, newly added
backend servers will enter the slow start mode. If an
offline backend server goes online or the weight of a
backend server is increased from 0, it will not enter
the slow start mode.
● After the slow start duration elapses, backend servers
will not enter the slow start mode again.
● Slow start takes effect when health check is enabled
and the backend servers are running normally.
● If health check is disabled, slow start takes effect
immediately.
Priority group Only TCP and UDP backend server groups support the
priority group function.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 502
Huawei Cloud Stack
Solution Description 9 Network Services
Virtual Requires the elastic IP addresses and subnets assigned in the VPC
Private service.
Cloud
(VPC)
Elastic Provides the traffic distribution control function for backend cloud
Cloud servers.
Server The backend cloud servers for ELB can be ECS or BMS.
(ECS)
Bare Metal
Server
(BMS)
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Elastic Load Balance (ELB) 8.3.0 Usage Guide (for Huawei Cloud Stack
8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 503
Huawei Cloud Stack
Solution Description 9 Network Services
Networking Solution
iptable rules are configured for servers to provide distributed network ACLs, which
protect both north-south and east-west traffic.
9.4.2 Advantages
Network ACL provides layered and flexible access control. It enables you to
conveniently manage access rules for cloud servers in a VPC, thereby enhancing
the security of cloud servers.
Network ACL provides the following advantages:
● Uses community standard FWaaS v2 APIs to provide native APIs.
● Supports traffic filtering based on the protocol number, source or destination
port number, and source or destination IP address.
● Allows an ACL policy to be referenced by multiple subnets for enhanced
usability.
● Simplifies the customer configuration in scenarios where multiple resource
spaces are interconnected by default.
9.4.4 Restrictions
Table 9-8 describes the restrictions on Network ACL.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 504
Huawei Cloud Stack
Solution Description 9 Network Services
Network ACL ● The supported protocols are TCP, UDP, ICMP (ICMPv6 for
rule IPv6 networks), and All (all protocols).
● The supported actions are Permit, Deny, and Reject.
● A network ACL rule can control traffic by source IP
address, destination IP address, source port, and
destination port.
● A rule ahead in sequence takes precedence. If two rules
of a network ACL conflict, the rule ahead in sequence
takes effect.
● A network ACL rule can control the traffic on both IPv4
and IPv6 networks.
9.4.5 Specifications
The network ACL service provides two types of specifications: large-scale and
small-scale. When deploying a service on the cloud platform, you can select the
specifications as required. The difference between large-scale and small-scale
specifications lies in the number of rules in a single network ACL instance. For
details, see Table 9-9.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 505
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 506
Huawei Cloud Stack
Solution Description 9 Network Services
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 507
Huawei Cloud Stack
Solution Description 9 Network Services
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Network ACL 8.3.0 Usage Guide (for Huawei Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 508
Huawei Cloud Stack
Solution Description 9 Network Services
● VPN Gateway
A VPN gateway is an egress gateway of a VPC. You can use a VPN gateway to
enable encrypted communication between a VPC and your data center or
between a VPC in one region and a VPC in another region. A VPN gateway
works together with the remote gateway in the local center or a VPC in
another region. Each local data center must have a remote gateway, and each
VPC must have a VPN gateway. A VPN gateway can connect to one or more
remote gateways. The VPN service allows you to set up VPN connections from
one point to one point or from one point to multiple points.
● Remote Gateway
Specifies the public IP address of a VPN in your data center or a VPC in
another region. This IP address is used for communicating with ECSs or BMSs
in a specified VPC.
● VPN Connection
A VPN connection is an Internet-based IPsec encryption technology. With the
special tunnel encryption technology, VPN connections use encrypted security
services to establish confidential and secure communications tunnels between
different networks.
A VPN connection connects VPN gateways and remote gateways of user data
center through establishing a secure and reliable encryption tunnel between
them. Currently, only the Internet Protocol Security (IPsec) VPN is supported.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 509
Huawei Cloud Stack
Solution Description 9 Network Services
Networking Solution
Professional network hardware devices are used to establish an encrypted
communication tunnel for network connectivity.
Functions
● Extending your data center to the cloud
If you want to build an enterprise hybrid cloud architecture, connecting your
local data center to cloud resources using an encrypted tunnel over the
Internet, create a VPN connection.
● Streamlining provisioning and management
You can provision and manage a VPN connection easily, and a newly created
VPN connection takes effect immediately.
● Extending your applications to the cloud
You can use a VPN to connect a VPC to your data center, extending your data
center to the VPC rapidly.
Key Technologies
Key Technology Description
In the example shown in Figure 9-23, you have created a VPC that has two
subnets, 192.168.1.0/24 and 192.168.2.0/24, on the cloud. You also have two
subnets, 192.168.3.0/24 and 192.168.4.0/24, on your router deployed in your data
center. In this case, you can create an IPsec VPN to enable communication
between subnets in your VPC and those in your physical data center.
Both site-to-site and hub-spoke VPNs are supported. You need to set up VPNs in
both your on-premises data center and the VPC to establish the VPN connection.
You must ensure that the VPN in your VPC and that in your data center use the
same IKE and IPsec policy configurations. Before creating a VPN, familiarize
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 510
Huawei Cloud Stack
Solution Description 9 Network Services
yourself with the protocols described in Table 9-11 and ensure that your device
meets the requirements and configuration constraints of the involved protocols.
RFC 2409 Defines the IKE protocol, which ● Use the PSK to reach
negotiates and verifies key an IKE peer agreement.
information to safeguard VPN ● Use the main mode to
connections. perform the
negotiation.
RFC 4301 Defines the IPsec architecture, the Set up a VPN connection
security services that IPsec offers, and using the IPsec tunnel.
the collaboration between
components.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 511
Huawei Cloud Stack
Solution Description 9 Network Services
9.5.3 Advantages
The VPN service is provided by professional devices, ensuring high VPN reliability.
In addition, the VPN service enables you to rapidly and smoothly migrate your
applications to the cloud, implementing hybrid cloud deployment and expanding
the computing capabilities of applications.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 512
Huawei Cloud Stack
Solution Description 9 Network Services
CIDR blocks of CIDR blocks of local subnet must be in the private network
local subnet segment.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 513
Huawei Cloud Stack
Solution Description 9 Network Services
Item Restriction
CIDR blocks of ● The remote subnet and the local subnet cannot have
remote subnet overlapping CIDR blocks.
● The remote subnet and the subnet for VPC peering
cannot have overlapping CIDR blocks.
● CIDR blocks of remote subnet cannot be in the private
network segment.
VPN gateway Each VPN gateway can be associated with only one VPC.
Correct example:
VPN connection 1: CIDR block of local subnet is 10.0.0.0/24, and CIDR blocks of
peering network are 192.168.0.0/24 and 192.168.1.0/24.
VPN connection 2: CIDR block of local subnet is 10.0.1.0/24, and CIDR block of
peering network is 192.168.2.0/24.
VPN connection 3: CIDR block of local subnet is 10.0.2.0/24, and CIDR block of
peering network is 192.168.2.0/24.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 514
Huawei Cloud Stack
Solution Description 9 Network Services
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Virtual Private Network (VPN) 8.3.0 Usage Guide (for Huawei Cloud
Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 515
Huawei Cloud Stack
Solution Description 9 Network Services
your local network, data center, and collocation environment to the VPC in the
cloud. This enables you to use legacy facilities and enjoy cloud computing
advantages, building a flexible and scalable hybrid cloud computing environment.
A direct connection consists of two sections. One is a physical connection,
connecting your local data center to the direct connection zone, and the other is a
virtual link, connecting the direct connection zone to a VPC in the cloud. This
document describes the virtual link. To connect your local data center to the
Huawei direct connection zone using a physical connection, use a leased physical
connection of a carrier. Then, create a virtual gateway, associate it with a VPC, and
create a virtual interface to connect the direct connection zone to the VPC. In this
way, your local data center will communicate with a VPC in the cloud.
Functions
● Ultra-high Security Performance
The Connection is a private connection and has no connection with the public
network. Its network links are used by only users. Therefore, its high security
performance allowing no data leakage can meet the requirements for
network connection from financial or government institutions.
● Stable Network Latency
Direct Connect provides stable network latency. Fixed routes are configured to
avoid unstable latency due to diversion caused by congestion or a fault.
Type
In the latest Huawei Cloud Stack 8.3.0, two types of Direct Connect solutions are
provided based on different application scenarios:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 516
Huawei Cloud Stack
Solution Description 9 Network Services
9.6.2.1 Connection
A connection is a leased physical connection of a carrier used to connect your
local data center to a direct connection zone. This type of connection enables you
to create multiple virtual interfaces to connect to your VPCs.
9.6.2.4 HA Group
HA Group supports active and standby Direct Connect connections for enhanced
Direct Connect. You can add two virtual interfaces to an HA group to provision
active and standby Direct Connect connections. When a Direct Connect connection
is faulty, the standby Direct Connect connection continues to carry service traffic,
reducing the impact of partial faults on the entire system.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 517
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 518
Huawei Cloud Stack
Solution Description 9 Network Services
Route Priority ● The EIP route has a higher priority than the Direct
Connect default IPv4 route.
● The IPv6 route for accessing the external network
has a lower priority than the Direct Connect default
IPv6 route.
● The priority of the Direct Connect default route is
mutually exclusive with that of the NAT Gateway
default route.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 519
Huawei Cloud Stack
Solution Description 9 Network Services
Table 9-15 shows the relationship between Direct Connect and other cloud
services.
Table 9-15 Relationship between Direct Connect and other cloud services
Service Name Description
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate the cloud service into a third-party
system for secondary development. For details, see API reference of the
service in Direct Connect 8.3.0 Usage Guide (for Huawei Cloud Stack
8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 520
Huawei Cloud Stack
Solution Description 9 Network Services
Resource Composition
VPCEP consists of endpoint services and endpoints that are created by service
providers and users respectively.
● Endpoint services: Currently, your private services are supported. You can
create an application on a cloud server in your VPC and configure it as a VPC
endpoint service.
● Endpoints: Endpoints are channels for connecting VPCs to VPC endpoint
services. You can create an application on an ECS in your VPC and configure it
as a VPC endpoint service. In the same region, you can create a VPC endpoint
in another VPC and then use this endpoint to access the endpoint service.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 521
Huawei Cloud Stack
Solution Description 9 Network Services
9.7.2.2 Endpoints
Endpoints are created by the service user and provide a connection channel
between VPCs and endpoint services. You can create an application on an ECS in
your VPC and configure it as a VPC endpoint service. In the same region, you can
create a VPC endpoint in another VPC and then use this endpoint to access the
endpoint service.
A VPC endpoint comes with a VPC endpoint service. VPC endpoints vary depending
on the type of the VPC endpoint services that they can access:
● Endpoints for accessing interface endpoint services are elastic network
interfaces that have private IP addresses.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 522
Huawei Cloud Stack
Solution Description 9 Network Services
● Endpoints for accessing gateway endpoint services are gateways, with routes
configured to distribute traffic to the associated gateway endpoint services.
Such endpoints allow access from both inside and outside the cloud.
To access gateway endpoint services connected to a VPC from outside the
cloud, create a gateway endpoint in your VPC first and use Cloud Connect,
VPN, basic Direct Connect, or enhanced Direct Connect to connect to the VPC.
9.7.2.3 VPC
The VPC service enables you to provision logically isolated, configurable, and
manageable virtual networks for cloud servers, improving the security of resources
in the system and simplifying network deployment. Cloud servers can be ECSs or
Bare Metal Servers (BMSs).
You can specify IP address ranges, create subnets, customize security groups, and
configure route tables and gateways in a VPC. This enables you to conveniently
manage and configure the network and rapidly and securely modify network
configurations. You can also customize access rules and network ACLs to control
cloud server access within a security group and across different security groups to
enhance security of cloud servers in the subnet.
9.7.2.4 Subnet
A subnet is a network segment in a VPC. Multiple subnets can be created for a
VPC to manage cloud servers with different service requirements and provide
cloud servers with IP address management and DNS services.
By default, cloud servers in all subnets of the same VPC can communicate with
one another, while cloud servers in different VPCs cannot communicate with one
another.
9.7.3 Advantages
With an endpoint, you can securely and easily access endpoint services in VPCs.
● Secure access
An endpoint service provides services in a VPC to resources in another VPC,
enabling point-to-point unidirectional access across VPCs while exposing no
server-related network information. The endpoint service makes your access
more secure and reliable.
● Convenient connection
An endpoint provides an easy-to-use, secure, and dedicated channel for a VPC
to connect to endpoint services, such as cloud services and users' private
services. The endpoint service uses an internal network and requires no EIP or
NAT gateway, providing a more powerful and flexible network.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 523
Huawei Cloud Stack
Solution Description 9 Network Services
● Simple operation
An endpoint service provider can create an application in a VPC and configure
it as an endpoint service. Other users can use endpoints to create connections
between their VPCs and the endpoint service of the service provider.
Figure 9-28 shows the process of connecting an IDC to VPC 1 over VPN or Direct
Connect, for the purpose of:
Cross-VPC Connection
With VPCEP, resources in two separate VPCs in a region can communicate with
each other.
You can create an application in your VPC and configure it as a VPC endpoint
service. An endpoint can be created in another VPC in the same region and then
used as a channel to access the endpoint service. Figure 9-29 shows the
connection details.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 524
Huawei Cloud Stack
Solution Description 9 Network Services
Service Description
Virtual Private Two types of VPCEP resources, that is, endpoint services and
Cloud (VPC) endpoints, are created in two separate VPCs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 525
Huawei Cloud Stack
Solution Description 9 Network Services
Service Description
Elastic Cloud An ECS can access the ECS and ELB in another VPC through
Server (ECS) VPCEP. An ECS can also provide backend resources for endpoint
services.
9.7.6 Restrictions
Before using VPCEP, learn the restrictions described in Table 9-19.
Item Restrictions
● Web UI
Log in to ManageOne Operation Portal (ManageOne Tenant Portal in B2B
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
VPC Endpoint (VPCEP) 8.3.0 Usage Guide (for Huawei Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 526
Huawei Cloud Stack
Solution Description 9 Network Services
With CC, you can load network instances in different regions to a cloud
connection to enable communication between private networks. The network
instances can be VPCs in the same region or authorized VPCs in different regions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 527
Huawei Cloud Stack
Solution Description 9 Network Services
9.8.3 Restrictions
● By default, a maximum of six network instances can be loaded to a cloud
connection in each region.
● By default, a maximum of six regions where network instances can be loaded
to a cloud connection are supported.
● A VPC can be loaded to only one cloud connection.
● A maximum of 150 CIDR blocks can be loaded to each network instance.
● For a cloud connection, CIDR blocks of all network instances must not
overlap, and subnet CIDR blocks must be unique. Otherwise, the
communication may fail.
● When you load a VPC to a cloud connection and enter VPC CIDR blocks,
loopback addresses, multicast addresses, or broadcast addresses are not
allowed.
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
9.9 CloudDNS
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 528
Huawei Cloud Stack
Solution Description 9 Network Services
The CloudDNS service associates private domain names that take effect only
within VPCs with private IP addresses to facilitate access to cloud services within
the VPCs. You can also directly access cloud services through private DNS servers.
Only cloud servers in a VPC associated with a private zone can access the record
sets of the private zone.
● When a cloud server in a VPC requests a private domain name, the private
DNS server directly returns a private IP address mapped to the domain name.
● When the cloud server requests a public domain name, the private DNS server
forwards the request to a public DNS server on the Internet and returns the
public IP address obtained from the public DNS server.
● When a cloud server in a VPC requests a private domain name, the private
DNS server directly returns a private IP address mapped to the domain name.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 529
Huawei Cloud Stack
Solution Description 9 Network Services
● When the cloud server requests a public domain name, the private DNS server
forwards the request to a public DNS server on the Internet and returns the
public IP address obtained from the public DNS server.
CNAME Map one domain name (an alias) to another (a canonical name).
NOTE
CNAME records are usually used to map multiple domain names to one
cloud server. When a DNS server points multiple domain names to the same
IP address, you can create an A record for one domain name and point it to
the server IP address, and create aliases (CNAME records) for other domain
names and point them to the domain name of the A record. If the server IP
address ever changes, you only need to change the A record to the new IP
address and all the CNAME records will automatically point to the new IP
address as well.
TXT Specify text records. TXT records are usually used in the following
scenarios:
● Record DKIM public keys to prevent email fraud.
● Record the identity of domain name owners to facilitate domain
name retrieval.
SRV Record the locations (such as host names and port numbers) of
servers providing specific services. The host in each SRV record must
point to the host name assigned with an IP address.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 530
Huawei Cloud Stack
Solution Description 9 Network Services
Type Description
NS No Yes No No No No No No
repeat
A No Yes No No No No No No
repeat
AAAA No Yes No No No No No No
rep
eat
MX No Yes No No No No No No
repeat
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 531
Huawei Cloud Stack
Solution Description 9 Network Services
TXT No Yes No No No No No No
repeat
PTR No Yes No No No No No No
repeat
SRV No Yes No No No No No No
repeat
9.9.2.3 TTL
TTL is short for time-to-live, which specifies the cache period of resource records
on a DNS server.
For example, when you are attempting to access a domain and the DNS cache
does not contain this domain record, the DNS server sends a request to an NS
server. When obtaining the record, the DNS server stores the TTL included in the
record. When you attempt to access the domain within the TTL duration, the DNS
server sends back the cached record as a response.
A short TTL makes it quick to update a record set.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 532
Huawei Cloud Stack
Solution Description 9 Network Services
NOTE
The name of a PTR private zone starts with the IP address typed in reverse order and
ends with .in-addr.arpa.
For example, if the IP address is 192.168.0.10, the private zone name is
10.0.168.192.in-addr.arpa.
● If the private zone name you specified is 192.in-addr.arpa, enter 10.0.168 as the
host record.
● If the private zone name you specified is 0.168.192.in-addr.arpa, enter 10 as the
host record.
2. Add a PTR record.
In the record set 0.168.192.in-addr.arpa, add a PTR record for each IP address
in the IP address segment 192.168.0.0/24.
– If the IP address is 192.168.0.1 and you add a PTR record with the host
record set to 1 and the host name value set to hostname1.example.com,
the reverse DNS lookup result of 192.168.0.1 is
hostname1.example.com.
– If the IP address is 192.168.0.2 and you add a PTR record with the host
record set to 2 and the host name value set to hostname2.example.com,
the reverse DNS lookup result of 192.168.0.2 is
hostname2.example.com.
Currently, a wildcard record can be added only for A, MX, AAAA, CNAME, TXT, and
SRV.
A wildcard DNS record can simplify the resolution if multiple subdomain names
(01.example.com, 02.example.com, 03.example.com, 04.example.com, and
05.example.com) to be resolved correspond to the same IP address or the same
group of IP addresses.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 533
Huawei Cloud Stack
Solution Description 9 Network Services
9.9.3 Advantages
● High performance: Offer a new generation of efficient and stable resolution
services, enabling hundreds of thousands of concurrent queries on a single
node.
● Easy access to cloud resources: Apply for domain names for cloud resources
and host them in the CloudDNS service so that you can access your cloud
resources with domain names.
● Isolation of core data: A private DNS server provides domain name resolution
for cloud servers carrying core data, enabling communications while
safeguarding the core data. You do not need to bind EIPs to these cloud
servers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 534
Huawei Cloud Stack
Solution Description 9 Network Services
are coded into the internal APIs called among the cloud servers. If one cloud
server is replaced in the system, the private IP address changes accordingly. In this
case, you also need to change that IP address in the APIs and re-publish the
website, bringing inconvenience for system maintenance.
However, if you create a private zone for each cloud server in the VPCs and map
domain names to private IP addresses, the cloud servers will be able to
communicate using private domain names. When you replace one of the cloud
servers, you only need to change the IP address in record sets, instead of
modifying the code.
9.9.5 Restrictions
Table 9-23 describes the restrictions on CloudDNS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 535
Huawei Cloud Stack
Solution Description 9 Network Services
Domain name When delivering a service domain name, use a root domain
constraints name that is different from the external service domain name
of the cloud platform.
Record set ● A maximum of 2,000 record sets can be added for each
private zone.
● By default, the system creates SOA and NS record sets for
each private zone. These record sets cannot be deleted,
modified, or manually added.
● You can add A, CNAME, AAAA, MX, TXT, SRV, and PTR
record sets for a private zone.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 536
Huawei Cloud Stack
Solution Description 9 Network Services
Service Description
Virtual Private The VPC service provides basic service networks for
Cloud (VPC) CloudDNS. After a private zone is associated with a VPC,
record sets of the private zone are accessible to the VPC.
scenarios) as a tenant, click in the upper left corner of the page, select a
region and resource space, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Cloud Domain Name Service (CloudDNS) 8.3.0 Usage Guide (for Huawei
Cloud Stack 8.3.0).
Functions
ENS can interconnect Huawei Cloud Stack 8.3.x, Huawei Cloud Stack 6.5.x, and
traditional resource pools. It uses hardware switches as connection gateways to
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 537
Huawei Cloud Stack
Solution Description 9 Network Services
provide high bandwidth, low latency, and stable network quality. The functions
include:
9.10.2.1 Site
An O&M administrator pre-configures the Huawei Cloud Stack regions to be
managed by using ENS. Each region maps to a site. After sites are pre-configured,
you can configure connectivity between the mapping regions.
9.10.2.3 Authorization
A system administrator or tenant administrator authorizes an ENS tenant or users
of the tenant to a site. After being authorized, the ENS tenant or users can create
cloud or legacy network endpoints.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 538
Huawei Cloud Stack
Solution Description 9 Network Services
9.10.2.8 Endpoint
An endpoint is a connector connecting a network segment to a Huawei Cloud
Stack region or traditional resource pool. Using endpoints speeds up the access of
resource pools to network segments.
9.10.3 Advantages
● Fast, high-performance, and stable networking across pools and clouds
A Huawei Cloud Stack 8.3.x region, a Huawei Cloud Stack 6.5.x region, and
some traditional resource pools are interconnected. Hardware switches are
used as connection gateways to enable stable networking with high
performance and low latency. Extension plug-ins are installed in Huawei
Cloud Stack regions to allow cloud nodes to connect to the connection
gateways over one-hop connections, making them the optimal paths on the
data plane.
● Flexible networking
You can configure custom routes and routing policies to build a global
network as needed.
● Consistent and simple user experience
A unified orchestration model helps mask networking differences between
regions and resource pools, delivering a consistent user experience. You can
enable automatic orchestration on the console.
● Visualized O&M
ENS supports monitoring by instance and collects golden metrics. You can
view them on the console to know service changes in a timely manner.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 539
Huawei Cloud Stack
Solution Description 9 Network Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 540
Huawei Cloud Stack
Solution Description 9 Network Services
9.10.6 Functions
ENS functions can be divided into two parts: functions for administrators to pre-
configure and control resources, and functions for tenants to manage network
resources.
● Functions for administrators
– Site management: An O&M administrator pre-configures the Huawei
Cloud Stack regions for which you will manage connectivity using ENS.
Each region maps to a site. After sites are pre-configured, you can
configure connectivity between the mapping regions on the console for
tenants.
– Tenant administrator: You can specify a user as a tenant administrator to
manage accounts and assign fine-grained permissions.
– Account management: You can add an account for accessing a site. After
the account is added, you can select a VPC of a tenant for connecting to
another region.
– Authorization: You can authorize users of an ENS tenant to a site. Then,
resource spaces of the site will appear on the console for tenants.
– Connection gateway management: ENS uses hardware switches to enable
connectivity across clouds and resource pools. You can manage and
monitor switches on the console for administrators, including detecting
hardware switches, monitoring connection status and key metrics,
verifying configuration consistency, managing connections, and displaying
topologies.
– Resource monitoring: ENS monitors the status of inter-site tunnels and
also traffic metrics including the number of bytes received over a tunnel
and number of packets received over a tunnel.
● Functions for tenants
– Global network management: A global network is a global network
container. It stores network service instances allowing for connectivity
across clouds and resource pools. A global network consists of network
segments.
– Network segment management: A network segment can be considered a
virtual router that enables routing within a VPC. You can configure
endpoints, routes, and policies for network segments to connect resource
pools over one global network.
– Endpoint management: An endpoint is a connector connecting a network
segment to a Huawei Cloud Stack region or traditional resource pool.
Using endpoints speeds up the access of resource pools to network
segments.
– Endpoint rule management: An endpoint rule controls whether endpoints
of a network segment can communicate with each other by default.
– Route management: Routes are the paths that network traffic takes from
a source network segment to a destination network segment. You can
configure routes as needed.
– Resource monitoring: Key metrics of each port are monitored.
– Topology: All configurations and monitored metrics of network segments
are displayed on the WebUI.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 541
Huawei Cloud Stack
Solution Description 9 Network Services
9.10.7 Constraints
Hardware switches are used as connection gateways. The following table lists the
switch models that can serve as connection gateways.
Tenants in B2B scenarios) as a tenant. Click in the upper left corner of the
page, select a region and resource space, and select the cloud service.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 542
Huawei Cloud Stack
Solution Description 10 Security Services
10 Security Services
Functions
SIS provides the following functions:
● Cloud service baseline check: Evaluate user cloud environments from the
aspects of identification, access control, intrusion prevention, resource control,
backup and recovery, and data security, provide suggestions for modifying
insecure configurations based on best practices, and provide links for quick
recovery.
● Compliance check: According to the technical requirements of classified
protection specifications, detect user cloud environments from two
dimensions (secure computing environment and secure communications
network) and provide compliance reports to assist users in compliance
evaluation.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 543
Huawei Cloud Stack
Solution Description 10 Security Services
is applied to the switch module globally or on a port. The switch module detects
data packets based on the conditions specified in the ACL and determines whether
to forward or discard the data packets. Each object has a security attribute defined
in the ACL. Only system users who have permission to access the ACL can perform
operations on the ACL, such as read and write.
10.1.3 Advantages
● Cloud platform configuration check
SIS allows you to evaluate the security of the cloud environment and
determine whether the security measures are sufficient. In addition, it
provides convenient paths to other security services so that you can configure
the services rapidly, saving security maintenance costs.
● Meeting security compliance requirements
SIS performs technical checks on the cloud environment and generates
reports in accordance with compliance requirements, assisting users in
conducting self-assessment of compliance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 544
Huawei Cloud Stack
Solution Description 10 Security Services
SIS workflow:
1. Users apply for SIS on the security service page of ManageOne Operation
Portal (ManageOne Tenant Portal in B2B scenarios).
2. SCC-Service creates subtasks based on the check credential in the request and
concurrently queries the configuration information about the tenant. Then,
SCC-Service analyzes and sorts the result, stores the result in SCC-GaussDB,
and sends the final check result to the user.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 545
Huawei Cloud Stack
Solution Description 10 Security Services
ELB SIS sends a request to ELB to obtain the instance ID and the
ID of the security group to which the instance belongs.
BMS SIS requests the instance list from BMS, including the instance
ID and the ID of the security group to which the instance
belongs.
KMS SIS sends a request to KMS to obtain the tenant service status.
OBS SIS sends a request to OBS to obtain the bucket policy, log,
and anti-leeching information.
10.2 EdgeFW
Functions
EdgeFW provides the following functions:
● Security protection: EdgeFW provides access control, IPS, and AV for north-
south traffic of EIPs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 546
Huawei Cloud Stack
Solution Description 10 Security Services
● Security logs: EdgeFW allows you to view log details based on the source IP
address, destination IP address, date, attack event, and protocol.
● Statistic reports: EdgeFW charts the rankings of attack types, trends,
protocols, and more.
Restrictions
The EIP traffic must pass through the hardware firewall for EdgeFW protection.
10.2.2.1 Firewall
A firewall is a network security device that monitors inbound and outbound
network traffic and decides whether to allow or block specific traffic based on a
defined set of security rules. A firewall can be a piece of hardware or a set of
software installed on common hardware. A firewall typically establishes a barrier
between a trusted internal network and untrusted external network to prevent
unauthorized users from accessing the internal network. A firewall comprises the
service access rules, verification tools, packet filtering, and application gateway.
10.2.3 Advantages
● Real-time intrusion prevention
The built-in threat detection engine detects and blocks threats from the
Internet in real time.
● Security compliance
The border protection and access control requirements are met.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 547
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 548
Huawei Cloud Stack
Solution Description 10 Security Services
EdgeFW workflow:
1. A user applies for EdgeFW on the security service interface of ManageOne
Operation Portal (ManageOne Tenant Portal in B2B scenarios) and sets
security policies.
2. SCC-LB sends the configured policies to SCC-Service.
3. SCC-Service invokes SecoManager. SecoManager automatically orchestrates
security policies and delivers them to the hardware firewall.
4. The hardware firewall records the detected EIP traffic exception in SSA-ES/
SSA-DF.
5. By using the search capability of SSA-ES, SCC-Service provides report statistics
and log query for users.
6. During protection, SCC-Service saves the read configuration information to
SCC-GaussDB.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 549
Huawei Cloud Stack
Solution Description 10 Security Services
Definition
Key Management Service (KMS) is a secure, reliable, and easy-to-use service that
helps users centrally manage and protect their Customer Master Keys (CMKs) and
data encryption keys (DEKs).
Functions
KMS provides the following functions:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 550
Huawei Cloud Stack
Solution Description 10 Security Services
Specifications
● The HSM edition of KMS uses HSMs to store the root key and supports
commercial cryptographic algorithms, targeting users from sectors with high
security and compliance requirements such as government and finance users.
● TASS SJJ1310 (not recommended), TASS SJJ19151 (recommended), SanSec
SJJ1212 (recommended), and SanSec SJJ1212 are supported. The product has
been certified by the Office of the State Commercial Cryptography
Administration (OSCCA).
10.3.2.1 CMK
A CMK is a Key Encryption Key (KEK) created by a user using KMS. It is used to
encrypt and protect Data Encryption Keys (DEKs). One CMK can be used to
encrypt one or more DEKs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 551
Huawei Cloud Stack
Solution Description 10 Security Services
obs/default OBS
NOTE
The Default Master Key is automatically generated when a user uses KMS encryption for
the first time through the corresponding cloud service (such as OBS). Default Master Keys
are independent among different tenants and among different services of the same tenant.
10.3.2.3 DEK
Data Encryption Keys (DEKs) are used by users to encrypt data.
10.3.2.4 HSM
A hardware security module (HSM) is a hardware device that securely produces,
stores, manages, and uses CMKs. In addition, it provides encryption processing
services.
10.3.2.6 TRNG
A true random number generator (TRNG) is a device that generates unpredictable
random numbers by physical procedures instead of computer programs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 552
Huawei Cloud Stack
Solution Description 10 Security Services
the intranet, but those in different regions cannot. Each AZ provides cost-effective
and low-latency network connections that are unaffected by faults that may occur
in other AZs. Therefore, deploying KMS in separate AZs protects customer
applications against local faults that occur in a specific location.
10.3.2.8 Project
A project is used to group and isolate OpenStack resources, including computing,
storage, and network resources. A project can be a department or a project team.
Multiple projects can be created for one account.
10.3.3 Advantages
● Enhanced data security
KMS uses powerful encryption algorithms to provide key creation and key
management capabilities. It enables cloud data storage and user service
applications to implement strong encryption protection for cloud data,
preventing data leakage.
● Unified key management
Key management is the core of encryption system security. KMS can manage
all keys (including CMKs, data keys, and root keys) of users in a unified
manner to implement fine-grained full-lifecycle management and control.
● In-depth service integration
KMS integrates with services such as OBS, DWS, and DataArts Studio, and
supports one-click provisioning. KMS can be used to manage keys of cloud
services. KMS APIs can be used to encrypt and decrypt data in the cloud.
● Security compliance support
Keys and random numbers are generated by the third-party HSM that has
passed security authentication. The root key of the KMS key system is stored
in the HSM. The keys are distributed in encrypted channels.
Server-Side Encryption for Cloud Services OBS, DWS, and DataArts Studio
Working with OBS, DWS, and DataArts Studio, KMS is used for server-side
encryption of data stored using OBS, DWS data tables, and DataArts Studio data
connection passwords. It provides an easy-to-use, one-click provisioned server-side
data encryption service for these services, preventing leakage of sensitive data.
Take OBS as an example. When a user uploads files using the OBS server-side
encryption method, they can select KMS encryption to have the files encrypted.
The files are automatically encrypted and stored on the cloud. When a user
downloads a file, the OBS service automatically invokes KMS to decrypt the file
and returns the plaintext file to the user.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 553
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 554
Huawei Cloud Stack
Solution Description 10 Security Services
1. After receiving the data ciphertext and DEK ciphertext sent by user 1, user 2
first obtains his/her private key and decrypts the DEK ciphertext using the
private key to obtain the plaintext of the DEK.
2. The DEK plaintext is used to decrypt the data ciphertext to obtain the data in
plaintext.
How OBS, DataArts Studio, and DWS Encryption and Decryption Work
The same encryption procedure applies to OBS, DataArts Studio, and DWS. The
following uses OBS as an example to describe the encryption procedure.
See Figure 10-7. KMS uses HSMs to create the required data encryption key (DEK)
for OBS and sends the DEK ciphertext copy (encrypted using the CMK) to OBS for
storage (generally stored in the metadata of the file). When a tenant uploads or
downloads a file, the OBS server calls the KMS service (providing the DEK
ciphertext and CMK ID), obtains the DEK plaintext and sends it to the OBS server,
and uses the encryption suite integrated on the OBS server to encrypt and decrypt
object data, and performs subsequent operations.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 555
Huawei Cloud Stack
Solution Description 10 Security Services
1. On the S3 (OBS) client, the user selects the encryption option, selects the
CMK, and uploads the object.
2. The S3 (OBS) server receives the request from the user and accesses KMS.
NOTE
At the first use, the Default Master Key ID is provided to apply for a DEK. In other
cases, the existing data key is requested to encrypt or decrypt data. (The S3 server
provides the corresponding CMK ID and DEK ciphertext after encryption.)
3. KMS assigns a DEK to the object data uploaded by the user, and returns the
plaintext DEK and a DEK encrypted copy to the S3 (OBS) server.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 556
Huawei Cloud Stack
Solution Description 10 Security Services
4. The S3 (OBS) server encrypts the data uploaded by the user by using the
plaintext DEK, encrypts the DEK by using the CMK, and saves the DEK
ciphertext to the S3 storage node.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 557
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 558
Huawei Cloud Stack
Solution Description 10 Security Services
Functions
The cloud firewall provides the following functions:
● Micro-isolation: You can configure access control rules at the ECS NIC level,
achieving fine-grained security protection.
You can isolate ECS NICs from each other whether they belong to a same
subnet.
● Visual traffic: You can define security policies based on topology access
relationships.
– A visual traffic topology is provided to help you configure security policies
semi-automatically, simplifying manual operations.
– You can pre-verify existing security policies so that they are configured
completely and correctly.
● Service tag: You can define security policies associated with a service tag.
When configuring security policies for ECSs, you can add a service tag to the
ECSs instead of recording their IP addresses. This means that tag-to-tag
access rules are used, replacing traditional IP-to-IP firewall rules.
● Policy inheritance: Access policies will be initially configured based on the
service access relationship, and will be inherited during capacity expansion.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 559
Huawei Cloud Stack
Solution Description 10 Security Services
NOTE
A project has been configured with the ● If you need to view the
security group and will be configured with network access relationship in
the CFW. the topology, it is
recommended that you disable
the security group or configure
the security group to allow all
traffic, and then use the CFW
and reconfigure firewall rules.
● If you do not need to view the
network access relationship in
the topology, it is
recommended that you retain
the existing security group
settings without configuring
any CFW.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 560
Huawei Cloud Stack
Solution Description 10 Security Services
Scenario Configuration
A project has not been configured with the It is recommended that you
security group and will be configured with configure the CFW and disable
the CFW. the security group or configure
the security group to allow all
traffic.
NOTE
● The two services provide similar functions. Therefore, you are not advised to use them
together.
● If the CFW and the security group coexist, they will be effective according to the
following rules:
● In the outbound direction, the security group takes precedence over the CFW.
● In the inbound direction, the CFW takes precedence over the security group.
10.4.2.1 Role
The role is an attribute tag for an ECS (actually an ECS NIC). This type of attribute
tag usually describes the service of an ECS. For example, web, app, and db in
Figure 10-11 can all be role attribute tags. After a role attribute tag is added to
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 561
Huawei Cloud Stack
Solution Description 10 Security Services
an ECS (actually an ECS NIC), the ECS will be associated with the corresponding
role.
10.4.2.2 Application
The application is another attribute tag for an ECS (actually an ECS NIC). This type
of attribute tag usually specifies the application system to which an ECS belongs.
For example, News Website System in Figure 10-11 can be an application
attribute tag. After an application attribute tag is added to an ECS (actually an
ECS NIC), the ECS will belong to the corresponding application system.
10.4.2.3 Environment
The environment is also an attribute tag for an ECS (actually an ECS NIC). This
type of attribute tag usually shows the lifecycle phase of an ECS. For example,
Develop, Test, and Production in Figure 10-11 can be environment attribute tags.
After an environment attribute tag is added to an ECS (actually an ECS NIC), the
ECS will run in the corresponding environment.
NOTE
Role, application, and environment attribute tags are used to divide ECSs (actually ECS
NICs) into groups in multiple aspects. This helps identify the assets of the user service
system and perform access control over them.
10.4.2.5 Policy
The Build mode is like the simulation mode. A policy in the Build mode is
ineffective. In this mode, traffic lines of different colors are used to reveal how
much your historical access relationship matches the current policy. You can
analyze the simulation result to check whether the rules are properly configured.
After configuring rules based on the traffic lines, you can switch the mode of the
policy to Enforce.
Build Mode
For a newly created business area, its policy is in the Build mode. In this mode, the
incoming and outgoing traffic among all the NICs of the business area is allowed
to pass, but the configured rules are actually ineffective.
Enforce Mode
After configuring rules based on the traffic line, you can switch the policy of the
business area to the Enforce mode to make the configured rules effective. After
the rules are effective, any access that does not match them is blocked.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 562
Huawei Cloud Stack
Solution Description 10 Security Services
NOTE
The policy of the business area can switch between the Build and Enforce modes.
10.4.3 Advantages
The CFW provides micro-isolation for tenant ECSs. With visual traffic, the CFW
allows you to configure security policies based on service attribute tags, which
minimizes security O&M complexity.
● Ease of use
To apply preset security policies, you only need to add an attribute tag that
corresponds to the service of the ECS.
● Convenient long-term O&M
In CFWs, security policies can be associated with different attribute tags,
which facilitates long-term O&M. Compared with the IP-address-based
configuration, the attribute-tag-based configuration simplifies O&M.
● Visible business relationship
The CFW topology displays a clear view of east-west traffic on ECSs.
● One-click isolation
You can use the security situation awareness service and security
collaboration to quickly isolate virus-infected ECSs.
Quick O&M
The CFW displays traffic in lines, which are clearly visible. This brings about easier
O&M than what was originally conducted by capturing packets or tcpdump.
Rapid Scaling
In the CFW, security policies will no longer be configured based on IP addresses.
Therefore, security policies will usually remain unchanged when a fast service
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 563
Huawei Cloud Stack
Solution Description 10 Security Services
increase occurs. A service attribute tag is associated with security policies. When
performing capacity expansion, you only need to add an attribute tag to
automatically apply the corresponding security policies.
ManageOn This is the CFW console, which lets you Deployed at the Global
e access CFW to create and manage layer
firewall policies.
CFW-ES/ Specifies the CFW log node, which is ● CFW-ES nodes are
CFW-DF used to collect traffic logs of tenant deployed in three-
ECSs. node cluster mode at
the Region.
● CFW-DF nodes are
deployed in two-node
active/standby mode
at the Region.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 564
Huawei Cloud Stack
Solution Description 10 Security Services
1. Users create and manage attributes, business areas, and rules on CFW
Console on ManageOne Operation Portal (ManageOne Tenant Portal in B2B
scenarios), and add a created attribute tag to their ECSs.
2. CFW Service calls the FWaaS API provided by Neutron to create rules.
3. Neutron writes the traffic information of ECSs to CFW-ES or CFW-DF.
4. CFW Service reads the traffic information of ECSs from CFW-ES or CFW-DF
and presents it to CFW Console.
10.4.7 Constraints
● Constraints for the CFW service are as follows:
– You can specify attribute tags and configure CFW rules for elastic cloud
servers (ECSs) and bare metal servers (BMSs), and cannot specify
attribute tags for PaaS containers.
– SR-IOV is not supported because of the FusionSphere network capability
limitation.
– Shared VPC is not supported.
Specifications
Description Specifications Restricted Adjustabl
By e
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 565
Huawei Cloud Stack
Solution Description 10 Security Services
Functions
DBAS can:
● Help enterprises meet database audit requirements, meet compliance
requirements of security laws and regulations in and outside China, and
provide compliance reports that meet data security standards.
● Back up and restore database audit logs and meet the audit data retention
requirements.
● Monitor risks, sessions, session distribution, and SQL distribution in real time.
● Report alarms for risky behavior and attacks and respond to database attacks
in real time.
● Locate internal violations and improper operations and keep data assets
secure.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 566
Huawei Cloud Stack
Solution Description 10 Security Services
Restrictions
● A DBAS instance and the protected database can be connected only through a
private IP address. You are advised to place the protected database and DBAS
instance in the same VPC.
● A DBAS instance can provide the following cloud databases in out-of-path
pattern:
– Databases built on ECS
– Databases built on BMS
● Currently, DBAS does not support IPv6.
● SSL must be disabled for databases in order to use DBAS to audit them
(because encrypted traffic cannot be audited).
● Currently, DBAS can audit the following types of databases: MySQL, ORACLE,
POSTGRESQL, SQLSERVER, DWS, GaussDB(for MySQL), Mongodb, DAMENG,
KINGBASE, GaussDB, SHENTONNG, GBase 8a, GBase XDM Cluster, GBase 8s,
and HBase.
● The DBAS agent can run on 64-bit Linux or 64-bit Windows OSs.
– Table 10-10 describes the Linux OSs supported by the DBAS agent.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 567
Huawei Cloud Stack
Solution Description 10 Security Services
▪ Windows 7(64bit)
▪ Windows 10(64bit)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 568
Huawei Cloud Stack
Solution Description 10 Security Services
NOTE
The DBAS agent depends on Npcap. If the message "Npcap not found, please
install Npcap first" is displayed when you install the DBAS agent, first install
Npcap and then the DBAS agent.
Npcap download link: https://npcap.com/#download
10.5.2 Advantages
Deployed in out-of-path pattern, database audit can perform flexible audit on the
database without affecting user services.
Easy Deployment
DBAS is deployed in out-of-path mode. It is simple to set up and operate.
Comprehensive Audit
You can audit databases built on ECS and BMS.
Quick Identification
You can perform 99%+ application association audit, comprehensive SQL parsing,
and accurate protocol analysis.
Efficient Analysis
You can import tens of thousands of data records per second, store mass data, and
process hundreds of millions of data records within seconds.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 569
Huawei Cloud Stack
Solution Description 10 Security Services
● DBAS complies with laws and regulations, such as the cybersecurity law and
SOX.
Separation of Duties
The rights of the system administrators, security administrators, and audit
administrators are separated to meet audit requirements.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 570
Huawei Cloud Stack
Solution Description 10 Security Services
SCC- Service node of security services. You Two nodes are deployed in
Service can manage DBAS instances as cluster mode at the Region
services. layer.
SCC- Database node, which provides the Two nodes are deployed in
GaussD data storage capability for DBAS active/standby mode at the
B Region layer.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 571
Huawei Cloud Stack
Solution Description 10 Security Services
Service Description
Elastic Cloud DBAS instances are created on ECS. You can use DBAS to audit
Server (ECS) databases built on ECS.
● Web UI
Log in to ManageOne Operation Portal (ManageOne Tenant Portal in B2B
scenarios) as a tenant, click in the upper left corner of the page, select a
region, and select the cloud service.
● API
Use this method if you need to integrate the cloud service into a third-party
system for secondary development. For details, see API reference of the
service in Huawei Cloud Stack 8.3.0 API Reference.
10.5.7 Concepts
Definition
Database Audit Service (DBAS) platform edition can audit and report security
alarms for databases on the management plane of the cloud platform. It records
user access to the database in real time, generates fine-grained audit reports, and
sends real-time alarms for risky operations and attack behaviors. In addition,
DBAS platform edition generates compliance reports that meet data security
standards to locate internal violations and improper operations, ensuring data
asset security.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 572
Huawei Cloud Stack
Solution Description 10 Security Services
NOTE
The platform DBAS is used only by O&M personnel. For details about how to use the DBAS,
see Database Audit Service (DBAS) Platform Edition 8.3.0 Maintenance Guide (for Huawei
Cloud Stack 8.3.0) and Database Audit Service (DBAS) Platform Edition 8.3.0 Operation
Guide (for Huawei Cloud Stack 8.3.0).
Functions
DBAS platform edition can:
● Help enterprises meet database audit requirements, meet compliance
requirements of security laws and regulations in and outside China, and
provide compliance reports that meet data security standards.
● Back up and restore database audit logs and meet the audit data retention
requirements.
● Monitor risks, sessions, session distribution, and SQL distribution in real time.
● Report alarms for risky behavior and attacks and respond to database attacks
in real time.
● Locate internal violations and improper operations and keep data assets
secure.
Restrictions
● A DBAS platform edition instance and the protected database can be
connected only through a private IP address. You are advised to place the
protected database and DBAS platform edition instance in the same VPC.
● Currently, DBAS platform edition does not support IPv6.
● Currently, the DBAS platform version can only be used to audit the Gauss100
database. Before using the DBAS platform edition, you must install an agent
on the database node or application node. The agent of the DBAS platform
edition can run on a 64-bit Linux databases. The supported Linux versions are
as follows.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 573
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 574
Huawei Cloud Stack
Solution Description 10 Security Services
10.6.2 Advantages
Deployed in out-of-path pattern, DBAS platform edition can perform flexible audit
on the database without affecting user services.
Easy Deployment
DBAS is deployed in out-of-path mode. It is simple to set up and operate.
Comprehensive Audit
You can audit databases built on the Huawei Cloud Stack management console.
Quick Identification
You can perform 99%+ application association audit, comprehensive SQL parsing,
and accurate protocol analysis.
Efficient Analysis
You can import tens of thousands of data records per second, store mass data, and
process hundreds of millions of data records within seconds.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 575
Huawei Cloud Stack
Solution Description 10 Security Services
Separation of Duties
The rights of the system administrators, security administrators, and audit
administrators are separated to meet audit requirements.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 576
Huawei Cloud Stack
Solution Description 10 Security Services
SCC- Service node of security services. You Two nodes are deployed in
Service can manage DBAS platform edition cluster mode at the Region
instances as services. layer.
SCC- Database node, which provides the Two nodes are deployed in
GaussD data storage capability for DBAS active/standby mode at the
B platform edition. Region layer.
10.6.5 Concepts
10.6.5.1 Instances
An instance of the DBAS platform edition is an independently running DBAS
platform edition.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 577
Huawei Cloud Stack
Solution Description 10 Security Services
Step 3 In the lower right corner of the ManageOne console, choose Common Links >
Database Security Audit Platform Edition > Region Name to access the DBAS
platform edition.
----End
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 578
Huawei Cloud Stack
Solution Description 10 Security Services
The process of forwarding traffic from WAF to origin servers is called back-to-
source. WAF uses back-to-source IP addresses to send client requests to the origin
server. When a website is connected to WAF, the destination IP addresses to the
client are the IP addresses of WAF, so that the origin server IP address is invisible
to the client.
Dedicated Mode
Table 10-15 describes dedicated WAF instances.
Item Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 579
Huawei Cloud Stack
Solution Description 10 Security Services
Item Description
Service Scale
For more details, see Table 10-16.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 580
Huawei Cloud Stack
Solution Description 10 Security Services
NOTICE
● The number of domains is the total number of top-level domain names (for
example, example.com), single domain names/subdomain names (for example,
www.example.com), and wildcard domain names (for example, *.example.com).
● If a domain name maps to different ports, each port is considered to represent
a different domain name. For example, www.example.com:8080 and
www.example.com:8081 are counted towards your quota as two distinct
domain names.
10.7.3 Functions
WAF helps you protect services from various web security risks. The following
table lists the functions of WAF.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 581
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 582
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 583
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 584
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 585
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 586
Huawei Cloud Stack
Solution Description 10 Security Services
Common protection
WAF helps you defend against common web attacks, such as command injection
and sensitive file access.
● Precise identification
WAF uses semantic analysis & regex to examine traffic from different
dimensions, precisely detecting malicious traffic.
● Distortion attack detection
WAF detects a wide range of distortion attack patterns with 7 decoding
methods to prevent bypass attempts.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 587
Huawei Cloud Stack
Solution Description 10 Security Services
Login Entry
Step 1 Use a browser to log in to ManageOne as a VDC administrator or VDC operator.
URL in B2B scenarios: https://Address for accessing ManageOne Tenant Portal, for
example, https://tenant.demo.com.
URL of the unified portal: https://Address for accessing the ManageOne unified
portal. Example: https://console.demo.com/moserviceaccesswebsite/unifyportal#/
home.
NOTE
If ManageOne_B2B is selected during installation, use the B2B scenario login mode.
In B2B scenarios, the operation administrator can access ManageOne Operation
Management Portal through the intranet and public network. Tenants can access
ManageOne Tenant Portal through the public network.
Step 2 Click in the upper left corner of the page, select a region, and choose Web
Application Firewall under Security.
----End
10.8 SecMaster
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 588
Huawei Cloud Stack
Solution Description 10 Security Services
Security Overview
It displays a comprehensive overview of asset security situation together with
other linked cloud security services.
Security SecMaster evaluates and scores your cloud asset security. You can
Score quickly learn of unhandled risks and their threats to your assets.
The lower the security score, the greater the overall asset security
risk.
Security You can view how many threats, vulnerabilities, and compliance
Monitoring risks that are not handled and view details of them.
Your You can view your security scores for the last 7 days.
Security
Score over
Time
Workspace Management
Workspaces are top-level workbenches in SecMaster. A single workspace can be
bound to common projects, to support workspace operation modes in different
application scenarios.
Security Situation
You can view the security overview on the large screen in real time and
periodically subscribe to security operation reports to know the core security
indicators.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 589
Huawei Cloud Stack
Solution Description 10 Security Services
Situatio Securit Security Overview evaluates and scores your cloud asset
n y Score security. You can quickly learn of unhandled risks and their
Overvie threats to your assets.
w The lower the security score, the greater the overall asset
security risk.
Your You can view your security scores for the last 7 days.
Securit
y Score
over
Time
Large Screen AI analyzes and classifies massive cloud security data and
then displays security incidents in real time on a large
screen. The large screen display gives you a simple, intuitive,
bird's eye view of the security of your entire network clearly
and efficiently.
Reports You can generate analysis reports. In this way, you can learn
about the security status of your assets in a timely manner.
Asset Management
SecMaster automatically discovers and manages all assets on and off the cloud
and displays the real-time security status of your assets.
Resource Synchronizes the security statistics of all resources and allows you
Manager to view the name, service, and security status of a resource,
helping you quickly locate security risks.
Risk Prevention
Risk prevention provides baseline check and vulnerability management functions
to help your cloud security configurations meet various authoritative security
standards, understand the global vulnerability distribution.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 590
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Module
Security Response
Threat operation provides various threat detection models to help you detect
threats from massive security logs and generate alerts; provides various security
response playbooks to help you automatically analyze and handle alerts, and
automatically harden security defense and security configurations.
Function Description
Module
Securit Query ● Search and analysis: Supports quick data search and
y and analysis, quick filtering of security data for security
Analysi Analysi survey, and quick locating of key data.
s s ● Statistics filtering: SecMaster supports quick analysis and
statistics of data fields and quick data filtering based on
the analysis result. Time series data supports statistics
collection by default time partition, allowing data volume
trend to be quickly spotted. SecMaster supports analysis,
statistics, and sorting functions, and supports quick
building of security analysis models.
● Visualization: Visualized data analysis intuitively reflects
service structure and trend, enabling customized analysis
reports and analysis indicators to be easily created.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 591
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Module
Security Orchestration
Security Orchestration supports playbook management, process management,
data class management (security entity objects), and asset connection
management. You can also customize playbooks and processes.
Function Description
Module
Data Collection
Collects various log data in multiple modes. After data is collected, historical data
analysis and comparison, data association analysis, and unknown threat discovery
can be quickly implemented.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 592
Huawei Cloud Stack
Solution Description 10 Security Services
Function Description
Module
Data Integration
Integrate security ecosystem products for associated operations or data
interconnection. After the integration, you can search for and analyze all collected
logs.
Function Description
Module
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 593
Huawei Cloud Stack
Solution Description 10 Security Services
Security Drills
Provides security assurance in the attack defense drills organized by regulatory
institutions through intrusion prevention, helping organizations pass the
assessments in the drills.
Security Evaluation
Perform the white box baseline test, black box attack surface assessment, and
attack vector detection before key incidents or drills to identify vulnerabilities.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 594
Huawei Cloud Stack
Solution Description 10 Security Services
NOTE
If ManageOne_B2B is selected during installation, use the B2B scenario login mode.
In B2B scenarios, the operation administrator can access ManageOne Operation
Management Portal through the intranet and public network. Tenants can access
ManageOne Tenant Portal through the public network.
Step 2 In the left upper corner of the page, click and choose Security > SecMaster.
----End
Service Features
● A CBH instance maps to an independent CBH system. You can configure a
CBH instance to deploy the mapped CBH system. A CBH system environment
is managed independently to ensure secure system running.
● A CBH system provides a single sign-on (SSO) portal, making it easier for you
to centrally manage large-scale cloud resources and safeguard accounts and
data of managed resources.
● CBH helps you comply with security regulations and laws, such as
Cybersecurity Law, and audit requirements in different standards, including
the following:
– Technical audit requirements in the Sarbanes-Oxley Act and Classified
Information Security Protection standard
– Technical audit requirements stated by the financial supervision
departments
– O&M audit requirements in relevant laws and regulations, such as
Sarbanes-Oxley Act, Payment Card Industry (PCI) standards, International
Organization for Standardization (ISO) and the International
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 595
Huawei Cloud Stack
Solution Description 10 Security Services
10.9.2 Features
CBH enables common authentication, authorization, account, and audit (AAAA)
management. Users can obtain O&M permissions by submitting tickets and can
invite O&M engineers to perform collaborative O&M.
Credential Authentication
CBH uses multi-factor authentication and remote authentication technologies to
enhance O&M security.
● Multi-factor authentication: CBH authenticates users by mobile one-time
passwords (OTPs), SMS messages, USB keys, and/or OTP tokens. This allows
you to mitigate O&M risks caused by leaked credentials.
● Remote authentication: CBH interconnects with third-party authentication
services or platforms to perform remote account authentication, prevent
credential leakage, and ensure secure O&M. Currently, Active Directory (AD),
Remote Authentication Dial-In User Service (RADIUS), Lightweight Directory
Access Protocol (LDAP), and Azure AD remote authentication are available.
CBH allows you to synchronize users from the AD domain server without
modifying the original user directory structure.
Account Management
With a CBH system, you can centrally manage system user accounts and managed
resource accounts, and establish a visible, controllable, and manageable O&M
system that covers the entire account lifecycle.
System CBH enables you to grant a unique account with specific permissions to each system
user user based on their responsibilities. This eliminates security risks resulting from the
accounts use of shared accounts, temporary accounts, or privilege escalation.
● Batch importing
CBH enables you to synchronize users from a third-party server or import users in
batches, eliminating the need to create users repeatedly.
● User groups
CBH allows you to add users of the same type in a group and assign permissions
by user group.
● Batch management
CBH enables you to manage user accounts in batches, including deleting, enabling,
and disabling user accounts, resetting user passwords, and modifying basic user
configurations.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 596
Huawei Cloud Stack
Solution Description 10 Security Services
Feature Description
Managed With a CBH system, you can centrally manage accounts of resources managed in the
resource CBH system through the entire account lifecycle, log in to managed resources by
accounts using SSO portal, and seamlessly switch between resource management and O&M.
● Resource types
CBH supports management of a wide range of resource types, including host (such
as Windows and Linux hosts) and database (such as MySQL and Oracle) resources.
– Host resources of the client-server architecture, including hosts configured with
the Secure Shell (SSH), Remote Desktop Protocol (RDP), Virtual Network
Computing (VNC), Telnet, File Transfer Protocol (FTP), SSH File Transfer
Protocol (SFTP), DB2, MySQL, SQL Server, Oracle, Secure Copy Protocol (SCP),
or Rlogin protocol.
– Application resources of the browser-server architecture or the client-server
architecture, including more than 12 types of browser- and client-side Windows
applications, such as Microsoft Edge, Google Chrome, and Oracle tools.
● Resource management
– Batch importing
CBH enables quick auto-discovery, synchronization, and batch importing of
cloud resources, such as Elastic Cloud Server (ECS) and Relational Database
Server (RDS) DB instances on the cloud for centralized O&M.
– Account group management
CBH manages resource accounts by group. By placing resource accounts of the
same attribute in the same group, you can assign permissions on a group basis
and let accounts inherit the permissions directly from the group to which they
belong.
– Password autofill
CBH uses the Advanced Encryption Standard (AES) 256-bit encryption
technology to encrypt managed resource accounts and uses the password auto-
filling technology to encrypt shared accounts, preventing data leakage.
– Automatic password change of managed resource accounts
CBH supports password change policies so that you can periodically change
account passwords to keep managed accounts secure.
– Automatic synchronization of managed resource accounts
CBH allows you to configure account synchronization policies so that you can
periodically check and synchronize account information between the CBH
system and the managed host resources. When you create, modify, or delete an
account on a host, the same operation is performed in CBH.
– Batch management
CBH allows you to batch manage information and accounts of managed
resources, including deleting a resource, adding a resource label, modifying
resource information, verifying a managed account, and deleting a managed
account.
Permissions Management
CBH supports fine-grained permission management so that you have complete
control over which user can access the CBH system and which managed resources
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 597
Huawei Cloud Stack
Solution Description 10 Security Services
can be accessed by a specific system user, enabling you to safeguard both the CBH
system and managed resources.
CBH You can assign permissions to a system user to log in to a CBH system
system and use different functional modules in the CBH system according to
access the user's responsibilities.
permiss ● System user roles
ion CBH supports role-based and module-based permission
management so that you can allow a system user to access specific
functional modules based on the user's responsibilities.
You can use default user roles or create custom roles by adding
various functional modules.
● Departments
CBH enables department-based system user management,
allowing you to specify departments of different levels for each
system user. There are no limits on the number of department
levels.
● Login restrictions
CBH controls system user logins from many dimensions, including
login validity period, login duration, multi-factor verification, IP
addresses, and MAC addresses.
Manag You can assign permissions for resources by user, user group, account,
ed and account group.
resourc ● Access control
e You can control resource access by resource access validity period,
access access duration, and IP address. CBH also allows you to assign
permiss permissions to users for uploading and downloading files,
ion transferring files, and using the clipboard. When an O&M initiates
an O&M session, the watermark indicating their identity will be
displayed in the background of the session window.
● Two-person authorization
You can configure multi-level authorization for users, allowing
them to access to a specific resource, and thereby safeguard
sensitive and mission-critical resources.
● Command interception
You can set command control policies or database control policies
to forcibly block sensitive or high-risk operations on servers or
databases, generate alarms, and review such operations. This gives
you more control over key operations.
● Batch authorization
You can grant permissions for multiple resources to multiple users
by user group or account group.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 598
Huawei Cloud Stack
Solution Description 10 Security Services
Operation Audit
In a CBH system, each system user has a unique identifier. After a system user logs
in to the CBH system, the CBH system logs their operations and monitors and
audits their operations on managed resources based on the unique identifier so
that any security events can be discovered and reported in real time.
System All operations in a CBH system are recorded, and alarms are reported
operati for misoperations, malicious operations, and unauthorized operations.
on ● System login logs
audit Details about a login, including the login mode, system user, source
IP address, and login time, are recorded. System login logs can be
exported with just a few clicks.
● System operation logs
All system operation actions are recorded. System operation logs
can be exported with just a few clicks.
● System reports
CBH displays all operation details of users in one place, including
user statuses, user and resource creation, login methods, abnormal
logins, and session controls.
System reports can be exported with just a few clicks and
periodically reported by email.
● Alarm notification
You can configure different alarm reporting methods and alarm
severity levels for system operation and your application
environment so that the CBH system sends alarm notifications by
email or system messages as soon as it determines system
exceptions and abnormal user operations.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 599
Huawei Cloud Stack
Solution Description 10 Security Services
Functi Description
on
Resourc A CBH system records user operations throughout the entire O&M
e O&M process and supports multiple O&M auditing techniques. It audits user
audit operations, identifies O&M risks, and provides the basis for tracing
and analyzing security events.
● Auditing techniques
– Linux command audits
For command operations through character-oriented protocols
(such as SSH and Telnet), a CBH system records the entire O&M
process, parses operation commands, reproduces operation
commands, and quickly locates and replays operations using
keywords in input and output results.
– Windows operation audits
For operations on terminals and applications through graphics
protocol (such as RDP and VNC), the CBH system records all
remote desktop operations, including keyboard actions, function
key operations, mouse operations, window instructions, window
switchover, and clipboard copy.
– Database command audit
For command operations through database protocols (such as
DB2, MySQL, Oracle, and SQL Server), the CBH system records
the entire process from single sign-on (SSO) to database
command operations, parses database operation instructions,
and reproduces all operating instructions.
– File transfer audits
For file transfer operations through file transfer protocols (such
as FTP, SFTP, and SCP), the CBH system audits the entire file
transfer process on web browsers or clients, and records the
names and destination paths of transferred files.
● O&M audit methods
– Real-time monitoring
Ongoing O&M sessions can be monitored, viewed, and
terminated.
– History logs
All O&M operations are recorded and history session logs can be
exported with just a few clicks.
– Session videos
Linux commands and Windows operations can be recorded by
video.
Video files can be downloaded with just a few clicks.
– Operation reports
CBH uses various reports to display O&M statistics in one place,
including O&M action distribution over time, resource access
times, session duration, two-person authorization, command
interception, number of commands, and number of transferred
files.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 600
Huawei Cloud Stack
Solution Description 10 Security Services
Functi Description
on
O&M Functions
CBH supports multiple architectures, tools, and methods to manage a wide range
of resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 601
Huawei Cloud Stack
Solution Description 10 Security Services
Functi Description
on
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 602
Huawei Cloud Stack
Solution Description 10 Security Services
Precise Interception
CBH presets standard Linux command library or allows you to customize
commands, so the CBH system can precisely intercept O&M operation instructions
and scripts when corresponding command control rules are triggered. In addition,
CBH uses the dynamic approval mechanism to dynamically control sensitive
operations in on-going O&M sessions, preventing dangerous and malicious
operations.
Multi-level Approval
With CBH, you can enable the multi-level approval mechanism to monitor O&M
operations on sensitive and mission-critical resources, improving data protection
and management capabilities and keeping data of critical assets secure.
Automatic O&M
CBH also gives you the ability to automate complex, repetitive, and large-quantity
O&M operations by configuring unified rules and tasks, free O&M personnel from
repetitive manual effort, and improve O&M efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 603
Huawei Cloud Stack
Solution Description 10 Security Services
CBH gives the ability to those enterprises to establish a sound O&M audit system
so that they can comply with industry supervision requirements. With CBH
deployed on the cloud, an enterprise can centrally manage accounts and
resources, isolate department permissions, configure multi-level review for
operations on mission-critical assets, and enable dual-approval for sensitive
operations.
Efficient O&M
Some enterprises, such as fast-growing Internet enterprises, have a large amount
of sensitive information, such as operations data, exposed on the external
networks. Their services are highly open. All these increase data leakage risks.
During the remote O&M, CBH hides the real IP addresses of your assets to protect
asset information from disclosure. In addition, CBH provides comprehensive O&M
logs to effectively monitor and audit the operations of O&M personnel, reducing
network security accidents.
CBH provides a system to manage a large number of O&M accounts and a wide
range of resources in a secure manner. It also allows O&M personnel to access
resources using single sign-on (SSO) tools, improving the O&M efficiency. In
addition, CBH uses fine-grained permission control so that all operations on a
managed resource are recorded and operations of all O&M staff are auditable.
Any O&M incidents are traceable, making it easier to locate the operators.
Additionally, the CBH system displays the on-going O&M sessions and receives
abnormal behavior alarm notifications to ensure that O&M engineers cannot
perform unauthorized operations.
Login Entry
Step 1 Use a browser to log in to ManageOne as a VDC administrator or VDC operator.
URL of the unified portal: https://Address for accessing the ManageOne unified
portal. Example: https://console.demo.com/moserviceaccesswebsite/unifyportal#/
home
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 604
Huawei Cloud Stack
Solution Description 10 Security Services
NOTE
If ManageOne_B2B is selected during installation, use the B2B scenario login mode.
In B2B scenarios, the operation administrator can access ManageOne Operation
Management Portal through the intranet and public network. Tenants can access
ManageOne Tenant Portal through the public network.
Step 2 Click in the upper left corner of the page, select a region, and choose
Security > Cloud Bastion Host.
----End
● Login address in non-B2B scenarios: https://Address for accessing
ManageOne Operation Portal,
● Login address in B2B scenarios: https://Address for accessing ManageOne
Tenant Portal,
10.10 Anti-DDoS
NOTE
Anti-DDoS is available only to O&M personnel and is invisible to tenants. For details about
how to use Anti-DDoS, see Anti-DDoS 1.2.0 Maintenance Guide (for Huawei Cloud Stack
8.3.0) > > Anti-DDoS 1.2.0 Operation Guide (for Huawei Cloud Stack 8.3.0) .
10.10.2 Functions
The Anti-DDoS service protects public IP addresses against layer-4 to layer-7
distributed denial of service (DDoS) attacks and sends alarms immediately when
detecting an attack. In addition, Anti-DDoS improves the bandwidth utilization to
further safeguard user services.
Anti-DDoS monitors the service traffic from the Internet to public IP addresses to
detect attack traffic in real time. It then scrubs attack traffic based on user-
configured defense policies without interrupting service running. It also generates
monitoring reports that provide visibility into the security of network traffic.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 605
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 606
Huawei Cloud Stack
Solution Description 10 Security Services
The detection center monitors network access traffic based on security policies you
configure. If an attack is detected, data is diverted to scrubbing devices for real-
time defense. Abnormal traffic is cleaned, and normal traffic is forwarded.
10.10.4 Advantages
CNAD Basic (Anti-DDoS) mitigates DDoS attacks against workloads on Huawei
Cloud. With Anti-DDoS, you can enjoy:
● Premium protection
Detects DDoS attacks in real time, discards attack traffic, and forwards
legitimate traffic to destination IP addresses.
Provides high-quality bandwidth to ensure service continuity and stability as
well as user access speed.
● Complete and accurate protection
A constantly updated database (carrying millions of blacklisted IP addresses)
coupled with a 7-layer, smart cleaning mechanism ensures accurate traffic
cleaning.
● Instantaneous response
With industry-leading technology and powerful scrubbing devices, Anti-DDoS
checks each packet and responds to any attack immediately without causing
service delays.
● Enabled automatically
This service is automatically enabled when you purchase an EIP. No expensive
scrubbing device or time-consuming installation is required.
● Free of charge
This service is free. You can use the service without purchasing any additional
resources.
NOTE
● CSP is deployed among the IaaS services in Huawei Cloud Stack. Its functions are similar
to those of HSS.
● CSP is available only to O&M personnel and is invisible to tenants. For details about
how to use CSP, see Compute Security Platform (CSP) 3.3.0 Maintenance Guide (for
Huawei Cloud Stack 8.3.0) > Compute Security Platform (CSP) 3.3.0 Operation Guide
(for Huawei Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 607
Huawei Cloud Stack
Solution Description 10 Security Services
Component Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 608
Huawei Cloud Stack
Solution Description 10 Security Services
Component Description
10.11.2 Functions
CSP provides risk prevention, intrusion detection, investigation and response,
security operation, and system O&M.
Risk Prevention
● Asset management
The accounts, ports, processes, software information, auto-started tasks, and
containers on your servers can be scanned. You can manage all your
information assets on the Assets page.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 609
Huawei Cloud Stack
Solution Description 10 Security Services
Containe Detect and list all container images on your 00:00 every
r images servers, including the image name, image ID, day
number of servers, and number of
vulnerabilities.
You can click a vulnerability report to check its
details, including vulnerability name, urgency,
number of affected services, number of
unprocessed images, number of historically
affected images, and solutions. You can fix the
vulnerability according to the suggestions
provided.
● Vulnerability management
The vulnerability management function detects vulnerabilities and risks in
Linux OSs and container images.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 610
Huawei Cloud Stack
Solution Description 10 Security Services
Commo ● Check for weak passwords and remind 00:00 every day
n weak users to change them, preventing easy
passwor guessing.
d ● On the Common Weak Password
detectio Detection tab, you can view the account
n name, account type, and usage duration
of a weak password.
Unsafe Detect unsafe Tomcat, Nginx, and SSH login 00:00 every day
settings configurations.
detectio On the Configure Detection page, you can
n view the description, matched detection
rules, threat level, and status of a
configuration.
You can handle risky configuration items
and ignore trusted items based on the
detection rules and results.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 611
Huawei Cloud Stack
Solution Description 10 Security Services
Intrusion Detection
● Event management
The event management function identifies and prevents intrusion to servers,
discovers risks in real time, detects and kills malicious programs, and identifies
web shells and other threats.
Webshel Check whether the files (PHP and JSP files) in your Real-time
l web directories are web shells. check
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 612
Huawei Cloud Stack
Solution Description 10 Security Services
● Container event
The container event function scans running containers to identify malicious
programs including miners and ransomware, detects malicious processes and
file modifications that violate container security policies, and container
escape, and provides suggestions.
Abnormal Container services are usually simple. If you are 00:00 every
container sure that only specific processes run in a day
processes container, you can add the processes to the
whitelist of the security policy, and associate the
policy with the container.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 613
Huawei Cloud Stack
Solution Description 10 Security Services
● Whitelist management
You can configure the alarm whitelist to reduce false alarms. Events can be
batch imported to and exported from the whitelist.
Function Description Check Interval
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 614
Huawei Cloud Stack
Solution Description 10 Security Services
Secure Operations
Function Description Check Mode
Signature library Signature libraries are used together 00:00 every day
management with policies and contain detection
policies and keywords.
Security baseline You can import detection templates 00:00 every day
to security baseline to specify the
target software and applications for
baseline scanning.
On the detection library
management page, you can upload a
signature detection library to match
the baseline scanning results.
System O&M
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 615
Huawei Cloud Stack
Solution Description 10 Security Services
10.11.3 Advantages
Centralized Management
You can check for and fix a range of security issues on a single console, easily
managing your servers.
On the security console, you can view the sources of terminal system risks in a
region, handle them according to displayed suggestions, and use filter, search, and
batch processing functions to quickly analyze the risks of all terminals in the
region.
Accurate Defense
CSP blocks attacks with pinpoint accuracy by using advanced detection
technologies and diverse libraries.
All-Round Protection
CSP protects servers against intrusions by prevention, defense, and post-intrusion
scan.
Lightweight Agent
The agent occupies only a few resources, not affecting server system performance.
10.11.4 Scenarios
Security Compliance
CSP reviews server assets, and scans for and reports intrusions, vulnerabilities
(such as VM escape), unsafe settings, suspicious programs, and file or website
content that has been tampered with. CSP helps enterprises manage security of
physical and virtual servers on the management planes of their cloud platforms,
detect intrusions in real time, and meet compliance requirements.
Account Protection
Take advantage of comprehensive account security capabilities, including
prevention, anti-attack, and post-attack scan.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 616
Huawei Cloud Stack
Solution Description 10 Security Services
Proactive Security
Count and scan your terminal assets, check and fix vulnerabilities and unsafe
settings, and proactively protect your network, applications, and files from attacks.
Intrusion Detection
Scan all possible attack vectors to detect and fight advanced persistent threats
(APTs) and other threats in real time, protecting your system from their impact.
10.11.5 Constraints
Supported Server Types
● VMs on the management plane
● PMs on the management plane
Supported OSs
CSP agents can run on Linux servers (such as CentOS and EulerOS).
Table 10-36 lists Linux OS versions supported by CSP.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 617
Huawei Cloud Stack
Solution Description 10 Security Services
HSS protects your system integrity, enhances application security, monitors user
operations, and detects intrusions.
Host Security
Host Security Service (HSS) helps you identify and manage the assets on your
servers, eliminate risks, and defend against intrusions and web page tampering.
There are also advanced protection and security operations functions available to
help you easily detect and handle threats.
Install the HSS agent on your servers, and you will be able to check the server
protection status and risks in a region on the HSS console.
Component Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 618
Huawei Cloud Stack
Solution Description 10 Security Services
Component Description
Container Security
HSS provides container security capabilities. The agent deployed on a server can
scan the container images on the server, checking configurations, detecting
vulnerabilities, and uncovering runtime issues that cannot be detected by
traditional security software. Container security also provides functions such as
process whitelist, read-only file protection, and container escape detection to
minimize the security risks for a running container.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 619
Huawei Cloud Stack
Solution Description 10 Security Services
10.12.2 Advantages
HSS helps you manage and maintain the security of all your servers and reduce
common risks.
Centralized Management
You can check for and fix a range of security issues on a single console, easily
managing your servers.
● You can install the agent on ECSs in the same region to manage them all on a
single console.
● On the security console, you can view the sources of server risks in a region,
handle them according to displayed suggestions, and use filter, search, and
batch processing functions to quickly analyze the risks of all servers in the
region.
Accurate Defense
HSS blocks attacks with pinpoint accuracy by using advanced detection
technologies and diverse libraries.
All-Round Protection
HSS protects servers against intrusions by prevention, defense, and post-intrusion
scan.
Lightweight Agent
The agent occupies only a few resources, not affecting server system performance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 620
Huawei Cloud Stack
Solution Description 10 Security Services
WTP
● The third-generation web anti-tampering technology and kernel-level event
triggering technology are used. Files in user directories can be locked to
prevent unauthorized tampering.
● The tampering detection and recovery technologies are used. Files modified
only by authorized users are backed up on local and remote servers in real
time, and will be used to recover tampered websites (if any) detected by HSS.
Features
HSS provides asset management, baseline check, and intrusion detection features,
enhancing server security in all aspects. For details about the features of different
editions, see Edition Details.
Baseline Scan for unsafe settings, weak passwords, and password complexity
check policies in server OS and key software.
A security practice baseline can be used for scans. You can
customize baseline sub-items used in scan.
You can repair and verify the detected risks.
Container Scan the images that are running or displayed in your image list,
image and provide suggestions on how to fix vulnerabilities and malicious
security files.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 621
Huawei Cloud Stack
Solution Description 10 Security Services
Feature Description
File Check the files in the Linux OS, applications, and other components
integrity to detect tampering.
monitorin
g
Container Control and intercept network traffic inside and outside a container
firewall cluster to prevent malicious access and attacks.
Intrusion Identify and prevent intrusion to servers, discover risks in real time,
detection detect and kill malicious programs, and identify web shells and
other threats.
Whitelist To reduce false alarms, import events to and export events from the
manage whitelist. Whitelisted events will not trigger alarms.
ment
Policy You can group policies and servers to batch apply policies to servers,
manage easily adapting to your business scenarios.
ment
Security Check weekly or monthly server security trend, key security events,
report and risks.
Recommended Editions
● If your servers store important data assets, have high security risks, use
publicly available EIPs, or there are databases running on your servers, you
are advised to enable the premium or Web Tamper Protection edition.
● For servers that need to protect websites and applications from tampering,
the WTP edition is recommended.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 622
Huawei Cloud Stack
Solution Description 10 Security Services
NOTICE
● You are advised to deploy HSS on all your servers so that if a virus infects
one of them, it will not be able to spread to others and damage your
entire network.
Edition Details
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 623
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 624
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 625
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 626
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 627
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 628
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 629
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 630
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 631
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 632
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 633
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 634
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 635
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 636
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 637
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 638
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 639
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 640
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 641
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 642
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 643
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 644
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 645
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 646
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 647
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 648
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 649
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 650
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 651
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 652
Huawei Cloud Stack
Solution Description 10 Security Services
10.12.4 Scenarios
HSS
● Centralized security management
With HSS, you can manage the security configurations and events of all your
cloud servers on the console, reducing risks and management costs.
● Security risk evaluation
You can check and eliminate all the risks (such as risky accounts, open ports,
software vulnerabilities, and weak passwords) on your servers.
● Proactive security
Count and scan your server assets, check and fix vulnerabilities and unsafe
settings, and proactively protect your network, applications, and files from
attacks.
● Intrusion detection
Scan all possible attack vectors to detect and fight advanced persistent
threats (APTs) and other threats in real time, protecting your system from
their impact.
CGS
● Container image security
Vulnerabilities will probably be introduced to your system through the images
downloaded from Docker Hub or through open-source frameworks.
You can use CGS to scan images for risks, including image vulnerabilities,
unsafe accounts, and malicious files. Receive reminders and suggestions and
eliminate the risks accordingly.
● Container runtime security
Develop a whitelist of container behaviors to ensure that containers run with
the minimum permissions required, securing containers against potential
threats.
Login Entry
Step 1 Log in to ManageOne as a VDC administrator or operator using a browser.
URL in non-B2B scenarios: https://Domain name of ManageOne Operation Portal,
Example: https://console.demo.com
URL of the unified portal: https://Address for accessing the ManageOne unified
portal. Example: https://console.demo.com/moserviceaccesswebsite/unifyportal#/
home.
You can log in using a password or a USB key.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 653
Huawei Cloud Stack
Solution Description 10 Security Services
Step 2 Click in the upper left corner of the page, select a region, and select HSS.
Step 3 Click Apply for HSS in the upper right corner of the page.
----End
10.13.2 Functions
CSMS can store, retrieve, and use secrets in a unified manner throughout their
lifecycles.
1. Collect secrets.
2. Upload the secrets to CSMS.
CSMS allows users to dynamically query secrets via APIs instead of hardcoding the
secrets, greatly reducing breach risks.
When an application reads its configurations, it calls CSMS APIs to retrieve secrets.
Neither hardcoded nor plaintext secrets are required.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 654
Huawei Cloud Stack
Solution Description 10 Security Services
Secret lifecycle management ● Create, view, and schedule and cancel the
deletion of secrets.
● Change the secret encryption key and
description.
Secret tag management Add, search for, edit, and delete tags.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 655
Huawei Cloud Stack
Solution Description 10 Security Services
Step 1 Create a secret on the console or via an API to store database information (such
as the database address, port, and password).
Step 2 Use an application to access the database. CSMS will query the secret you created.
Step 3 CSMS retrieves and decrypts the secret ciphertext, and securely returns the
information stored in the secret to the application through the secret
management API.
Step 4 The application obtains the decrypted plaintext secret and uses it to access the
database.
----End
Intelligent Defense
CFWforHCS has integrated security capabilities and network threat intelligence. Its
AI intrusion prevention engine can detect and block malicious traffic in real time.
It works with other security services globally to defend against Trojans, worms,
injection attacks, vulnerabilities, phishing, and brute-force attacks.
High Scalability
CFWforHCS can implement refined control on all traffic, including Internet border,
cross-VPC, and cross-ECS traffic, to prevent external intrusions, internal
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 656
Huawei Cloud Stack
Solution Description 10 Security Services
Easy-to-Use Application
As a cloud-native firewall, CFWforHCS can be enabled easily, import multi-engine
security policies with a few clicks, automatically check assets within seconds, and
provide a UI for performing operations, greatly improving management and
defense efficiency.
10.14.2 Features
CFWforHCS provides the standard edition and the professional edition. You can
use access control, intrusion prevention, traffic analysis, and log audit functions on
the console.
Dashboa You can check basic information about firewall instances, resource
rd protection, and more statistics.
Access You can control traffic at Internet and VPC borders based on IP
Control addresses, regions, and domain names.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 657
Huawei Cloud Stack
Solution Description 10 Security Services
Item Description
Intrusion ● Protection Mode: Check and block Internet traffic to detect and
Preventi prevent intrusion.
on ● Basic Defense: It provides threat detection and vulnerability scan
based on the built-in IPS rule library.
– It checks whether traffic contains phishing, Trojans, worms,
hacker tools, spyware, password attacks, vulnerability attacks,
SQL injection attacks, XSS attacks, and web attacks.
– It checks whether there are protocol anomalies, buffer
overflow, access control, suspicious DNS activities, and other
suspicious behaviors in traffic.
NOTE
● In the basic defense (IPS) rule library, you can manually modify
protection actions.
● You can query rule information by rule ID, signature name, risk level,
update time, CVE ID, attack type, rule group, and current action in the
basic defense (IPS) rule library.
● Custom IPS signature: You can customize IPS signature rules.
CFWforHCS will detect threats in data traffic based on signatures.
NOTE
HTTP, TCP, UDP, POP3, SMTP and FTP protocols can be configured in user-
defined IPS signatures.
● Sensitive Directory Scan Defense: Defend against scan attacks
on sensitive directories on your servers.
● Reverse Shell Defense: Defend against reverse shells.
Antivirus The anti-virus function identifies and processes virus files through
virus feature detection to prevent data damage, permission change,
and system breakdown caused by virus files.
The antivirus function can check access via HTTP, SMTP, POP3, FTP,
IMAP4, and SMB.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 658
Huawei Cloud Stack
Solution Description 10 Security Services
10.14.3 Scenarios
5-tuple
A 5-tuple (or quintuple) consists of a source IP address, a destination IP address, a
protocol, a source port, and a destination port.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 659
Huawei Cloud Stack
Solution Description 10 Security Services
IPS
An intrusion prevention system (IPS) is located between a firewall and a network
device. It blocks attacks from suspicious communications before they are spread to
other network devices.
Internet Access
Internet access refers to the access from Internet IP addresses to cloud servers.
Internet access protection helps you defend against intrusions from the outside in
a timely manner.
Inspection VPC
An inspection VPC is used for a VPC border firewall to divert traffic. After a CIDR
block is configured, CFWforHCS creates an inspection VPC by default to divert
traffic between the enterprise router and firewall.
The following table describes the differences between CFWforHCS and WAF.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 660
Huawei Cloud Stack
Solution Description 10 Security Services
Defi Cloud Firewall 2.0 (Cloud Firewall for WAF keeps web services stable
niti HCS, CFWforHCS) is a next-generation and secure. It examines all HTTP
on cloud-native firewall. It protects and HTTPS requests to detect
Internet and VPC borders on the cloud and block the following attacks:
by real-time intrusion detection and Structured Query Language
prevention, global unified access (SQL) injection, cross-site
control, full traffic analysis, log audit, scripting (XSS), web shells,
and tracing. It employs AI for command and code injections,
intelligent defense, and can be file inclusion, sensitive file access,
elastically scaled to meet changing third-party vulnerability exploits,
business needs, helping you easily Challenge Collapsar (CC) attacks,
handle security threats. CFWforHCS malicious crawlers, and cross-site
provides basic network security request forgery (CSRF).
protection for your workload on the
cloud.
Fea ● Asset management and intrusion WAF identifies and blocks a wide
ture defense: It detects and defends range of suspicious attacks, such
s against intrusions into cloud assets as SQL injections, XSS attacks,
that are accessible over the web shell upload, command or
Internet in real time. code injections, file inclusion,
● Access control: You can control unauthorized sensitive file
access at Internet borders. access, third-party vulnerability
exploits, CC attacks, malicious
● Traffic analysis and log audit: It crawlers, and CSRF.
controls, analyzes, and visualizes
VPC traffic, audits logs, and traces
traffic sources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 661
Huawei Cloud Stack
Solution Description 10 Security Services
NOTE
NDR is available only to O&M personnel and is invisible to tenants. For details about NDR
functions, see Network Detection and Response (NDR) 3.1.0.CP1 Maintenance Guide
(for Huawei Cloud Stack 8.3.0) > Network Detection and Response (NDR) 3.1.0.CP1
Operation Guide (for Huawei Cloud Stack 8.3.0).
When a host suffers web attacks, NDR analyzes Layer 7 protocols (including
interaction protocols such as HTTP, Redis, and MySQL) to detect all traffic passing
through the core router. When detecting traffic with malicious features, the NDR
constructs blocking packets and sends them to the attacker and host through the
core router to block the access and protect the host. Figure 10-24 shows the NDR
architecture.
1. The traffic of the attacker flows into the core router, and then the core router
forwards the traffic to the host.
2. The traffic of the core router is copied to the NDR through the optical splitter.
3. After determining that the network attack occurs, the NDR constructs a
blocking packet and sends it to the core router.
4. The core router forwards the constructed blocking packet to the attacker and
host to block the attack access.
● Attack statistics
NDR provides built-in security rules to accurately identify multiple types of
attacks, such as brute force cracking, SQL injection, and Log4j. The number of
attacks and attack types in the last hour can be collected.
● Traffic analysis
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 662
Huawei Cloud Stack
Solution Description 10 Security Services
The system analyzes the copy of all traffic passing through the core router in
real time and displays the incoming and outgoing traffic and IP addresses in
different periods in charts.
● Log analysis
NDR supports attack event logs, blocking logs, traffic logs, and audit logs to
comprehensively record detailed information about attack sources and
destinations, helping O&M personnel accurately locate network attacks.
● Access protection
NDR protects your services against common network attacks based on the
rules that are developed from Huawei security practices and continuously
updated. You can choose to put the detected attacks in observation mode or
interception mode.
● Threat intelligence
Industry threat intelligence and Huawei Cloud threat intelligence library are
used to discover the geographical location of attack IP addresses, which can
be used for precise protection.
● Alarm notifications
Currently, attack alarm notifications are supported. When the number of
network attacks reaches the alarm threshold, the NDR reports an alarm to
the ManageOne Maintenance Portal, on which you can perform unified O&M.
10.15.2 Advantages
Multi-scenario Defense
Multiple detection and interception models are preset to easily cope with various
attack scenarios.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 663
Huawei Cloud Stack
Solution Description 10 Security Services
High-precision interception
NDR is based on the Deep Flow Inspection (DFI) technology and checks mirrored
traffic. It accurately collects and analyzes north-south traffic data packets at the
bottom-layer of key network areas, including bandwidth, network protocols,
network segment-based services, abnormal network traffic, and application service
exceptions. The detection accuracy reaches 99%.
High-Reliability System
Data plane: Clusters are deployed in the same AZ. Traffic is distributed to the NDR
through the traffic splitter. When an NDR node is faulty, the traffic splitter
automatically distributes traffic to other normal nodes. In addition, the NDR works
in out-of-path mirroring mode, which does not affect service running.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 664
Huawei Cloud Stack
Solution Description 10 Security Services
If a cloud host is cracked by a hacker, the host becomes a zombie host. The hacker
usually uses a jump server to control the zombie host for a second brute force
cracking and malicious scanning, in an attempt to increase the number of
controlled hosts. Figure 10-25 is a diagram illustration.
Figure 10-25 Brute force cracking and malicious scanning on cloud hosts
● Brute-force cracking
NDR detects and intercepts brute force cracking on FTP, SSH, RDP protocols,
and common web management backgrounds, including phpMyAdmin and
WordPress, as well as malicious access to databases, including MS-SQ and
MySQL.
● Malicious scan
NDR detects common scanning tools and vulnerability scanning, such as
Nmap scanning, ZMap scanning, RPC vulnerability scanning, and CLDAP
reflection attack scanning, to perceive and record risk events.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 665
Huawei Cloud Stack
Solution Description 10 Security Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 666
Huawei Cloud Stack
Solution Description 10 Security Services
Traffic Audit
NDR can record access logs of high-risk protocols, middleware applications, and
hacker tools. The logs can be used for traffic audit and analysis.
Supported OSs
Table 10-44 lists the system versions supported by NDR.
NOTE
PBH is a service deployed on the Huawei Cloud Stack base. Its functions are simialr to those
of CBH.
Service Features
● A PBH instance maps to an independent PBH system. You can configure a
PBH instance to deploy the mapped PBH system. A PBH system environment
is managed independently to ensure secure system running.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 667
Huawei Cloud Stack
Solution Description 10 Security Services
● A PBH system provides a single sign-on (SSO) portal, making it easier for you
to centrally manage large-scale cloud resources and safeguard accounts and
data of managed resources.
● PBH helps you comply with security regulations and laws, such as
Cybersecurity Law, and audit requirements in different standards, including
the following:
– Technical audit requirements in the Sarbanes-Oxley Act and Classified
Information Security Protection standard
– Technical audit requirements stated by the financial supervision
departments
– O&M audit requirements in relevant laws and regulations, such as
Sarbanes-Oxley Act, Payment Card Industry (PCI) standards, International
Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC) 27001, and other internal compliance
regulations
10.16.2 Features
CBH enables common authentication, authorization, account, and audit (AAAA)
management. Users can obtain O&M permissions by submitting tickets and can
invite O&M engineers to perform collaborative O&M.
Credential Authentication
CBH uses multi-factor authentication and remote authentication technologies to
enhance O&M security.
● Multi-factor authentication: CBH authenticates users by mobile one-time
passwords (OTPs), SMS messages, USB keys, and/or OTP tokens. This allows
you to mitigate O&M risks caused by leaked credentials.
● Remote authentication: CBH interconnects with third-party authentication
services or platforms to perform remote account authentication, prevent
credential leakage, and ensure secure O&M. Currently, Active Directory (AD),
Remote Authentication Dial-In User Service (RADIUS), Lightweight Directory
Access Protocol (LDAP), and Azure AD remote authentication are available.
CBH allows you to synchronize users from the AD domain server without
modifying the original user directory structure.
Account Management
With a CBH system, you can centrally manage system user accounts and managed
resource accounts, and establish a visible, controllable, and manageable O&M
system that covers the entire account lifecycle.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 668
Huawei Cloud Stack
Solution Description 10 Security Services
System CBH enables you to grant a unique account with specific permissions to each system
user user based on their responsibilities. This eliminates security risks resulting from the
accounts use of shared accounts, temporary accounts, or privilege escalation.
● Batch importing
CBH enables you to synchronize users from a third-party server or import users in
batches, eliminating the need to create users repeatedly.
● User groups
CBH allows you to add users of the same type in a group and assign permissions
by user group.
● Batch management
CBH enables you to manage user accounts in batches, including deleting, enabling,
and disabling user accounts, resetting user passwords, and modifying basic user
configurations.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 669
Huawei Cloud Stack
Solution Description 10 Security Services
Feature Description
Managed With a CBH system, you can centrally manage accounts of resources managed in the
resource CBH system through the entire account lifecycle, log in to managed resources by
accounts using SSO portal, and seamlessly switch between resource management and O&M.
● Resource types
CBH supports management of a wide range of resource types, including host (such
as Windows and Linux hosts) and database (such as MySQL and Oracle) resources.
– Host resources of the client-server architecture, including hosts configured with
the Secure Shell (SSH), Remote Desktop Protocol (RDP), Virtual Network
Computing (VNC), Telnet, File Transfer Protocol (FTP), SSH File Transfer
Protocol (SFTP), DB2, MySQL, SQL Server, Oracle, Secure Copy Protocol (SCP),
or Rlogin protocol.
– Application resources of the browser-server architecture or the client-server
architecture, including more than 12 types of browser- and client-side Windows
applications, such as Microsoft Edge, Google Chrome, and Oracle tools.
● Resource management
– Batch importing
CBH enables quick auto-discovery, synchronization, and batch importing of
cloud resources, such as Elastic Cloud Server (ECS) and Relational Database
Server (RDS) DB instances on the cloud for centralized O&M.
– Account group management
CBH manages resource accounts by group. By placing resource accounts of the
same attribute in the same group, you can assign permissions on a group basis
and let accounts inherit the permissions directly from the group to which they
belong.
– Password autofill
CBH uses the Advanced Encryption Standard (AES) 256-bit encryption
technology to encrypt managed resource accounts and uses the password auto-
filling technology to encrypt shared accounts, preventing data leakage.
– Automatic password change of managed resource accounts
CBH supports password change policies so that you can periodically change
account passwords to keep managed accounts secure.
– Automatic synchronization of managed resource accounts
CBH allows you to configure account synchronization policies so that you can
periodically check and synchronize account information between the CBH
system and the managed host resources. When you create, modify, or delete an
account on a host, the same operation is performed in CBH.
– Batch management
CBH allows you to batch manage information and accounts of managed
resources, including deleting a resource, adding a resource label, modifying
resource information, verifying a managed account, and deleting a managed
account.
Permissions Management
CBH supports fine-grained permission management so that you have complete
control over which user can access the CBH system and which managed resources
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 670
Huawei Cloud Stack
Solution Description 10 Security Services
can be accessed by a specific system user, enabling you to safeguard both the CBH
system and managed resources.
CBH You can assign permissions to a system user to log in to a CBH system
system and use different functional modules in the CBH system according to
access the user's responsibilities.
permiss ● System user roles
ion CBH supports role-based and module-based permission
management so that you can allow a system user to access specific
functional modules based on the user's responsibilities.
You can use default user roles or create custom roles by adding
various functional modules.
● Departments
CBH enables department-based system user management,
allowing you to specify departments of different levels for each
system user. There are no limits on the number of department
levels.
● Login restrictions
CBH controls system user logins from many dimensions, including
login validity period, login duration, multi-factor verification, IP
addresses, and MAC addresses.
Manag You can assign permissions for resources by user, user group, account,
ed and account group.
resourc ● Access control
e You can control resource access by resource access validity period,
access access duration, and IP address. CBH also allows you to assign
permiss permissions to users for uploading and downloading files,
ion transferring files, and using the clipboard. When an O&M initiates
an O&M session, the watermark indicating their identity will be
displayed in the background of the session window.
● Two-person authorization
You can configure multi-level authorization for users, allowing
them to access to a specific resource, and thereby safeguard
sensitive and mission-critical resources.
● Command interception
You can set command control policies or database control policies
to forcibly block sensitive or high-risk operations on servers or
databases, generate alarms, and review such operations. This gives
you more control over key operations.
● Batch authorization
You can grant permissions for multiple resources to multiple users
by user group or account group.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 671
Huawei Cloud Stack
Solution Description 10 Security Services
Operation Audit
In a CBH system, each system user has a unique identifier. After a system user logs
in to the CBH system, the CBH system logs their operations and monitors and
audits their operations on managed resources based on the unique identifier so
that any security events can be discovered and reported in real time.
System All operations in a CBH system are recorded, and alarms are reported
operati for misoperations, malicious operations, and unauthorized operations.
on ● System login logs
audit Details about a login, including the login mode, system user, source
IP address, and login time, are recorded. System login logs can be
exported with just a few clicks.
● System operation logs
All system operation actions are recorded. System operation logs
can be exported with just a few clicks.
● System reports
CBH displays all operation details of users in one place, including
user statuses, user and resource creation, login methods, abnormal
logins, and session controls.
System reports can be exported with just a few clicks and
periodically reported by email.
● Alarm notification
You can configure different alarm reporting methods and alarm
severity levels for system operation and your application
environment so that the CBH system sends alarm notifications by
email or system messages as soon as it determines system
exceptions and abnormal user operations.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 672
Huawei Cloud Stack
Solution Description 10 Security Services
Functi Description
on
Resourc A CBH system records user operations throughout the entire O&M
e O&M process and supports multiple O&M auditing techniques. It audits user
audit operations, identifies O&M risks, and provides the basis for tracing
and analyzing security events.
● Auditing techniques
– Linux command audits
For command operations through character-oriented protocols
(such as SSH and Telnet), a CBH system records the entire O&M
process, parses operation commands, reproduces operation
commands, and quickly locates and replays operations using
keywords in input and output results.
– Windows operation audits
For operations on terminals and applications through graphics
protocol (such as RDP and VNC), the CBH system records all
remote desktop operations, including keyboard actions, function
key operations, mouse operations, window instructions, window
switchover, and clipboard copy.
– Database command audit
For command operations through database protocols (such as
DB2, MySQL, Oracle, and SQL Server), the CBH system records
the entire process from single sign-on (SSO) to database
command operations, parses database operation instructions,
and reproduces all operating instructions.
– File transfer audits
For file transfer operations through file transfer protocols (such
as FTP, SFTP, and SCP), the CBH system audits the entire file
transfer process on web browsers or clients, and records the
names and destination paths of transferred files.
● O&M audit methods
– Real-time monitoring
Ongoing O&M sessions can be monitored, viewed, and
terminated.
– History logs
All O&M operations are recorded and history session logs can be
exported with just a few clicks.
– Session videos
Linux commands and Windows operations can be recorded by
video.
Video files can be downloaded with just a few clicks.
– Operation reports
CBH uses various reports to display O&M statistics in one place,
including O&M action distribution over time, resource access
times, session duration, two-person authorization, command
interception, number of commands, and number of transferred
files.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 673
Huawei Cloud Stack
Solution Description 10 Security Services
Functi Description
on
O&M Functions
CBH supports multiple architectures, tools, and methods to manage a wide range
of resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 674
Huawei Cloud Stack
Solution Description 10 Security Services
Functi Description
on
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 675
Huawei Cloud Stack
Solution Description 10 Security Services
Precise Interception
CBH presets standard Linux command library or allows you to customize
commands, so the CBH system can precisely intercept O&M operation instructions
and scripts when corresponding command control rules are triggered. In addition,
CBH uses the dynamic approval mechanism to dynamically control sensitive
operations in on-going O&M sessions, preventing dangerous and malicious
operations.
Multi-level Approval
With CBH, you can enable the multi-level approval mechanism to monitor O&M
operations on sensitive and mission-critical resources, improving data protection
and management capabilities and keeping data of critical assets secure.
Automatic O&M
CBH also gives you the ability to automate complex, repetitive, and large-quantity
O&M operations by configuring unified rules and tasks, free O&M personnel from
repetitive manual effort, and improve O&M efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 676
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 677
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Functions
VBS has the following functions:
● EVS disk backup
● Policy-driven data backup
● Backup data management
● Backup replication and saving
● EVS disk data restoration using backups or replicas
● EVS disk creation using backups or replicas
● Task management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 678
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
11.1.2 Advantages
VBS supports both full backup and incremental backup. If data is fully backed up
by default in the first backup, incremental backups are performed subsequently.
For both full and incremental backups, you can restore the data in EVS disks to
the state when the backup was created.
VBS also supports replication of backups. If a backup is damaged, you can use its
replica to restore data.
VBS is easy to use. You can perform backup and restoration for the EVS disks on
the ECS/BMS (referred to as server in this document) with one click.
VBS has the following advantages:
● Ease-of-Use
Backup can be configured in three steps and does not require elaborate
planning. Compared with traditional backup services, VBS saves your efforts in
planning and expanding servers and storage devices.
● Flexibility
With different backup policies, backup can be automatically done to cover
various backup scenarios. Permanent incremental backup, incremental
restoration, and short backup window.
● Cost-Effectiveness
Permanent incremental backup is used. The initial full backup backs up all
data on the server. Subsequent backups are incremental, occupying a small
amount of space.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 679
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Hacker VBS can restore EVS disks to the latest backup point in time
attacks and when the server has not been affected by hacker attacks and
virus viruses.
infection
Mis-deletion VBS can restore data to the backup point in time prior to the
mis-deletion.
Application VBS can immediately restore the system to the latest backup
update time point before the application update to restore normal
errors system operation.
Server VBS can immediately restore the disk data before the system
breakdown breaks down or restore the data to another disk.
Local AZ The data can be restored in other AZs using replicas to restore
fault the services quickly.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 680
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
CSBS- Users can apply for VBS and Deployed at the region layer.
VBS back up and restore EVS disks Backup service console is deployed
Console on the Cloud Backup Console. on the static server of
ManageOne. You do not need to
apply for independent resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 681
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Service Flow
Backup
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 682
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Restoration
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 683
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
1. A user selects the backup to be restored and selects the target volume (the
source volume, another volume, or a new volume).
2. CSBS-VBS Console delivers a restoration task to Karbor based on the tenant's
restoration request.
3. Karbor invokes the Cinder restoration API and eBackup driver to deliver the
restoration task.
4. The eBackup driver invokes the backup server and backup proxy to restore
data volumes.
5. The backup server and backup proxy reads backup data from the backup
storage.
6. The backup server and backup proxy writes the backup data to the physical
storage where the target volumes reside.
Intra-Region Replication
Figure 11-4 shows the intra-region replication service flow.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 684
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 685
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
EVS VBS relies on EVS and backs up EVS disks. Users can use a backup
or replica to restore data on the original EVS disk or to another
existing EVS disk, or use the backup or replica to create an EVS
disk.
OBS 2.0 VBS uses the OBS as backup storage and saves backups in OBS
(FusionStor buckets.
age OBS), NOTE
OBS 3.0 OBS 3.0 is not recommended for the current version.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 686
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Item Requirement
Recovery Time Objective (RTO) The RTO depends on the amount of data to be
restored. Restoration time = Data amount/
Restoration performance. The restoration
performance depends on the backup storage
type (NFS or S3) and network type (GE, 10GE,
or 25GE).
scenarios). Click in the upper left corner, select a region and resource set,
and select the cloud service.
● API
Use this mode if you need to integrate the cloud service into a third-party
system for secondary development. For details, see the Volume Backup
Service (VBS) 8.5.0 API Reference (for Huawei Cloud Stack 8.3.0) in the
Volume Backup Service (VBS) 8.5.0 Usage Guide (for Huawei Cloud Stack
8.3.0).
Definition
Cloud Server Backup Service (CSBS) can create a backup for an Elastic Cloud
Server (ECS) and Bare Metal Server (BMS) (including the configuration
specifications of the ECS and BMS, and data on system and data disks. BMS
supports only data backup on data disks.), and restore the service data of the ECS
and BMS by using the backup data. This service ensures the security and
correctness of the data.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 687
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Functions
CSBS has the following functions:
● Server/Disk-based backup
● Policy-driven data backup
● Intelligently associating the server
● Backup data management
● Backup data supports intra-region replication and cross-region replication.
● Cross-region restoration of copies to the original region or other regions is
supported.
● ECS creation using backups or replicas
● The server data restoration using backups or replicas
● Managing tasks
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 688
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 689
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
11.2.1.2 Advantages
By default, CSBS executes a full backup for a server that has not been backed up.
By default, incremental backup is performed for the server that has been backed
up or has an available backup. No matter whether the backup is full or
incremental, you can restore the data in the server to the state at the backup
point in time.
● Ease-of-Use
Backup can be configured in three steps and does not require elaborate
planning. Compared with traditional backup services, CSBS saves your efforts
in planning and expanding servers and storage devices.
● Flexibility
With different backup policies, backup can be automatically done to cover
various backup scenarios. Permanent incremental backup, incremental
restoration, and short backup window.
● Cost-Effectiveness
Permanent incremental backup is used. The initial full backup backs up all
data on the server. Subsequent backups are incremental, occupying a small
amount of space.
Application Function
Scenarios
Hacker CSBS can restore a server to the latest backup point in time
attacks and when the server has not been affected by hacker attacks and
virus viruses.
infection
Mis-deletion CSBS can restore a server to the backup point in time prior to
the mis-deletion.
Application CSBS can immediately restore the system to the latest backup
update time point before the application update to restore normal
errors system operation.
Server CSBS can immediately restore the disk data of the server before
breakdown the system breaks down or restore the data to another server.
Local AZ The data can be restored in other AZs using replicas to restore
fault the services quickly.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 690
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Application Function
Scenarios
Local region The data can be restored in other regions using replicas to
fault restore the services quickly. After the source region is rebuilt, you
can restore a replica to its source region.
Logical Architecture
Figure 11-6 shows the logical architecture of CSBS.
CSBS-VBS Users can apply for CSBS and Deployed at the region layer.
Console back up and restore servers Backup service console is deployed
on the Cloud Backup on the static server of ManageOne.
Console. You do not need to apply for
independent resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 691
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Productio Storage device used to store The production storage and backup
n storage production data. server and backup proxy must be
For details, see OceanStor deployed in the same data center.
BCManager 8.3.1 eBackup The network latency between the
Version Mapping. production storage and backup
server and backup proxy is fewer
than 2 ms.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 692
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Backup Storage devices used to back The backup storage and production
storage up production data. storage can be deployed in the
For details, see OceanStor same data center or in different
BCManager 8.3.1 eBackup data centers.
Version Mapping. The network quality requirements
for the level-1 backup storage and
backup server and backup proxy are
as follows:
● NAS: Network latency ≤ 2 ms
● Object storage: Network latency
≤ 20 ms
The network quality requirements
for the level-2 backup storage and
backup server and backup proxy are
as follows:
● NAS: Network latency ≤ 2 ms
● Object storage: Network latency
≤ 20 ms
Technical Overview
Backup
Figure 11-7 shows the backup service flow.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 693
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 694
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
1. A user restores the desired backup to the source server or another server.
2. CSBS-VBS Console delivers the restoration task to Karbor based on the user's
restoration request.
3. Karbor schedules data restoration and invokes Cinder to deliver the task.
3.1 Karbor invokes the Nova API to shut down the server, detach volumes, and
lock the server.
3.2 Karbor invokes the Cinder restoration API and eBackup driver to deliver
the task of restoring data of each volume.
3.3 eBackup driver invokes the backup server and backup proxy to restore
data volumes.
4. The backup server and backup proxy read backup data from the backup
storage.
5. The backup server and backup proxy write the backup data to the physical
storage where the target volumes reside.
6. After the server data is restored, Karbor invokes the Nova API to unlock the
server, attach volumes, and power on the server.
Intra-Region Replication
Figure 11-9 shows the intra-region replication service flow.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 695
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 696
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 697
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
ECS CSBS can back up data of the EVS disks on an ECS, and restore
backup data to the EVS disks of an ECS or create an ECS to
retrieve lost or corrupted data. Generated backups can be used to
create images for fast restoring the service running environment.
BMS CSBS can back up data of EVS disks on a BMS, and restore backup
data to the EVS disks of a BMS to retrieve lost or corrupted data.
OBS 2.0 CSBS uses the OBS as backup storage and saves backups in OBS
(FusionStor buckets.
age OBS), NOTE
OBS 3.0 OBS 3.0 is not recommended for the current version.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 698
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Maximum number of 32
backup policies for one
tenant
Maximum number of 64
servers that can be
associated with one policy
scenarios). Click in the upper left corner, select a region and resource set,
and select the cloud service.
● API
To integrate the cloud service into a third-party system for secondary
development, use APIs. For details, see Cloud Server Backup Service (CSBS)
8.5.0 API Reference (for Huawei Cloud Stack 8.3.0) in the Cloud Server Backup
Service (CSBS) 8.3.1 API Reference (for Huawei Cloud Stack 8.2.1) of the
Cloud Server Backup Service (CSBS) 8.5.0 Usage Guide (for Huawei Cloud
Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 699
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Definition
Application backup, a function provided by Cloud Server Backup Service (CSBS),
can back up the files and databases on Elastic Cloud Servers (ECSs) and Bare
Metal Servers (BMSs) in user data centers. You no longer need to back up the
entire servers or disks. In case of inadvertent deletion or software/hardware fault
in the data center, data can be recovered to any point in time when it was backed
up.
The application backup can be classified into the following two types:
● Fileset backup: backs up one or more files on VMs or servers in the user data
center.
● Database backup: backs up the database applications on VMs or servers in
the user data center.
ECSs or BMSs are hereinafter referred to as servers.
For details about the operating systems (OSs) and versions supported by fileset
backup as well as the database types and versions supported by database backup,
see OceanStor BCManager 8.5.0 Application Backup Compatibility List.
Function
Application backup provides the following functions:
● Fileset backup
● Database backup
● Policy-driven data backup
● Backup data management
● Fileset recovery using backups or replicas
● Database recovery using backups or replicas
● Task management
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 700
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
● You are advised to reserve at least 1 GB memory space on the host for
application backup. Otherwise, the task may fail.
● The application backup service depends on the Direct Connect (enhanced)
network service. Otherwise, the backup network configuration for application
backup will fail.
11.2.2.2 Advantages
Full backup is performed by default when an application is backed up for the first
time. Incremental backup is performed by default for the application that has
been backed up or has available backups. Both full and incremental backups allow
you to fast and conveniently recover the data in the application to the state when
it was backed up.
● Ease-of-Use
Backup can be configured in three steps and does not require elaborate
planning. Unlike traditional backup services, the application backup function
saves your efforts in planning and expanding servers and storage devices.
● Flexibility and Efficiency
With different backup policies, backup can be automatically done to cover
various backup scenarios. The permanent incremental backup and
incremental recovery reduce backup time.
● Cost-Effectiveness
Permanent incremental backup is used. The initial full backup backs up all
data on the server. Subsequent backups are incremental, occupying a small
amount of space.
Application Function
Scenario
Application Immediately recovers to the latest backup time point before the
update application update to restore normal system operation.
errors
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 701
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Application Function
Scenario
Logical Architecture
Figure 11-12 shows the logical architecture of application backup.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 702
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Karbor Used to manage the client, Deployed on two VMs at the Region
Proxy such as client installation layer.
and uninstallation.
Client The client software consists Each host is installed with one
of the client assistant and client.
application client.
The former is used to
manage application clients,
whereas the latter is used to
communicate with the DPA
to obtain production data
and implement backup and
recovery.
Implementation Principles
Backup
Figure 11-13 shows the backup service flow.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 703
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 704
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Service Description
Item Indicator
Number of database N x 32
backup policies per user N indicates the number of database types.
Maximum number of 64
servers that can be
associated with a policy
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 705
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Item Indicator
Number of tasks that can Users can query and export all tasks in the last 30
be queried and exported days.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 706
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Functions
CSDR functions (BMSs, SFSs, and EVS disks are not supported by CSHA+CSDR
service instances, and SFSs and EVS disks are not supported by VHA+CSDR service
instances):
● Cross-region DR of ECSs/BMSs
Tenants can apply for CSDR and add multiple ECSs/BMSs to a CSDR service
instance to ensure remote replication consistency. Remote replication DR can
be implemented in synchronous or asynchronous mode. CSDR can
automatically perform scheduled remote replication on arrays according to
configured remote replication policies.
● SFS cross-region DR
Tenants can apply for SFS DR and add SFS to the DR service instance to
implement remote replication consistency. Synchronous remote replication is
supported.
● DR test of ECSs/BMSs
Tenants can apply for DR tests to verify the data availability in the DR center.
DR tests have no impact on the production center.
● Planned migration of ECSs/BMSs
In the production center, when a planned power-off (planned power outage,
or routine O&M), a DR administrator can perform planned migration of ECSs/
BMSs by one click, ensuring zero data loss.
● Planned switchover and fault recovery for SFS DR.
In the production center, in the case of a planned power-off (planned power
outage, or routine O&M), a DR administrator can perform planned migration
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 707
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
for SFSs, ensuring zero data loss. When the production center malfunctions
due to a power outage, fire, or another disaster, a DR administrator can
perform fault recovery on SFSs to fast start ECSs in the DR center, minimizing
impacts on services.
● Recovery of ECSs/BMSs in a malfunctioning data center to a remote center
When the production center malfunctions due to a power outage, fire, or
another disaster, a DR administrator can perform fault migration on ECSs/
BMSs by one click to fast recover ECSs/BMSs to a DR center, minimizing
impacts on services.
Figure 11-16 and Figure 11-17 illustrates the working process of CSDR.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 708
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
● Two OpenStack systems are deployed in the local and remote centers
respectively and they belong to different regions.
● When a VDC administrator or a VDC operator creates a CSDR service instance,
remote replication of data is available through storage only when the
production ECS is running normally or stopped and the DR ECS is stopped; the
production BMS is running normally and the DR BMS is running normally or
stopped.
● DR tests and fault recovery can be performed to ensure DR ECS/BMS service
availability.
11.3.2 Advantages
Storage-based Replication
Synchronous replication (RPO = 0) and asynchronous replication (the minimum
replication period is 5 minutes) are supported. The replication process does not
affect the ECS/BMS computing performance.
Data Consistency
Allows tenants to perform consistency replication DR protection for all volumes of
one ECS or a group of ECSs or some volumes of BMS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 709
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Transparent to Applications
This solution provides cross-site remote replication based on IaaS for the storage
layer and administrators do not need to know about DR capabilities of
applications in VMs.
DR Testing
Tenants can perform DR tests to check whether services on the DR ECS or BMS
can be restored. The test does not affect production VMs.
Simple DR Management
DR administrators can perform fault recovery, reprotection, and planned migration
for ECS/BMS protection instances.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 710
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 711
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 712
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Service Flow
● Figure 11-22 shows the workflow of applying for a CSDR service instance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 713
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 714
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 715
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Cloud Description
Service
Name
Metric Value
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 716
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Metric Value
Tenants in B2B scenarios) as a tenant, click in the upper left corner of the
page, select a region, and select the cloud service.
● API
Use this mode if you need to integrate the cloud service into a third-party
system for secondary development. For details, see the DR Services (CSDR,
CSHA, and VHA) 8.5.0 API Reference (for Huawei Cloud Stack 8.3.0) in the
Cloud Server Disaster Recovery (CSDR) 8.5.0 Usage Guide (for Huawei
Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 717
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
● You cannot perform HA protection for partial EVS disks of an ECS. After a new
EVS disk is attached to an HA ECS, HA protection needs to be manually added
for this EVS disk.
● In the FusionStorage active-active scenario, when the FusionStorage
replication cluster node is faulty, the ECS that has applied for CSHA protection
in the same AZ cannot be accessed.
● When the CSHA service uses the automatic switchover mode, a switchover is
triggered only if a site-level fault occurs (only when the controller node, all
members of the compute node cluster, and storage HyperMetro replication
are faulty). A service network fault or fault of partial compute nodes will not
trigger a cross-site switchover and therefore ECS services may be interrupted.
● The protection type of a CSHA instance cannot be changed to CSHA+CSDR.
● The protection type of a CSHA+CSDR instance cannot be changed to CSHA.
11.4.2 Advantages
Active-Active Storage
Benefiting from the solid reliability of the active-active feature, the failure of a
single storage device does not lead to a business interruption or data loss
(RPO=0). During the storage data replication, the computing performance of ECSs
will be not adversely affected.
DR Management
Key management nodes, such as ManageOne, OceanStor BCManager
eReplication, and FusionSphere OpenStack, can be deployed across sites, and be
connected to the third site for arbitration. An automatic failover will be triggered
when one site fails or a link failure occurs. Non-key management nodes support
cross-site DR and manual failover.
Data Consistency
CSHA allows you to enable consistent active-active protection for all EVS disks in
one or one group of ECSs.
Application Unawareness
Based on IaaS, CSHA supports cross-site active-active at the storage layer. Once a
site fails, business will be taken over and restored before the users feel it.
DR Test
Tenants can perform a DR test to check whether services on the DR ECS can be
restored. The test does not affect production VMs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 718
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 719
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 720
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Service Flow
● Workflow of applying for a CSHA service instance
Figure 11-28 shows the workflow of applying for a CSHA service instance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 721
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 722
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
ECS ECS allows CSHA to apply for and create production and DR ECSs.
EVS EVS provides EVS disks for production and DR ECSs, and indirectly
provides EVS disks for CSHA.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 723
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Metric Value
Tenants in B2B scenarios) as a tenant, click in the upper left corner of the
page, select a region, and select the cloud service.
● API
Use this mode if you need to integrate the cloud service into a third-party
system for secondary development. For details, see the DR Services (CSDR,
CSHA, and VHA) 8.5.0 API Reference (for Huawei Cloud Stack 8.3.0) in the
Cloud Server High Availability Service (CSHA) 8.5.0 Usage Guide (for
Huawei Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 724
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
● All EVS disks associated with the ECSs/BMSs in a VHA service instance must
be provided by the same production storage that is configured with the local
storage-based active-active DR.
● You cannot perform DR protection for only some EVS disks of an ECS. If
storage active-active protection needs to be canceled for some EVS disks in
VHA instances, EVS disks must be detached from ECSs first. Otherwise, the
active-active protection cannot be canceled.
● After a new EVS disk is attached to the ECS/BMS that has been configured
with DR protection, you need to manually add DR protection for the newly
attached EVS disk.
● ECSs/BMSs that attach the same shared EVS disk must belong to the same
VHA service instance.
● When creating a DR instance, ensure that BMSs in the instance are running.
Service Instance
A VHA service instance is a set of high availability (HA) settings for EVS disks on
the production ECS/BMS. You can add or delete ECSs/BMSs and add or delete EVS
disks from the service instance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 725
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
11.5.3 Advantages
Active-Active Storage
If a single storage device is faulty, data loss and service interruption will not occur,
improving storage reliability. The computing performance of ECSs/BMSs is not
affected during the storage data replication.
Data Consistency
Tenants can perform consistent active-active storage protection for all disks of one
ECS/BMS or an ECS/BMS group.
Application Unawareness
Based on Infrastructure as a Service (IaaS), VHA supports active-active at the
storage layer. Once a storage device fails, application data in the ECSs/BMSs will
be taken over and restored before the users feel it.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 726
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 727
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 728
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Service Flow
Figure 2 shows the workflow of VHA.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 729
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 730
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 731
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
ECS The VHA service provides local storage active-active protection for
EVS disks where ECSs are mounted.
BMS The VHA service provides local storage active-active protection for
EVS disks where BMSs are mounted.
EVS The VHA service provides local storage active-active protection for
EVS disks attached to ECSs/BMSs.
Tenants in B2B scenarios) as a tenant, click in the upper left corner of the
page, select a region, and select the cloud service.
● API
Use this mode if you need to integrate the cloud service into a third-party
system for secondary development. For details, see the DR Services (CSDR,
CSHA, and VHA) 8.5.0 API Reference (for Huawei Cloud Stack 8.3.0) in the
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 732
Huawei Cloud Stack
Solution Description 11 DR and Backup Services
Volume High Availability (VHA) 8.5.0 Usage Guide (for Huawei Cloud
Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 733
Huawei Cloud Stack
Solution Description 12 Container Services
12 Container Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 734
Huawei Cloud Stack
Solution Description 12 Container Services
Features
CCE is a one-stop container platform that provides full-stack container services
from Kubernetes cluster management, lifecycle management of containerized
applications, application service mesh, and Helm charts to add-on management,
application scheduling, and monitoring and O&M.
One-Stop Deployment and O&M
You can create a Kubernetes container cluster in just a few clicks, without needing
to set up Docker or Kubernetes environments. Automatic deployment and O&M of
containerized applications can be performed all in one place throughout the
application lifecycle.
Container Cluster Diversity
CCE works closely with heterogeneous infrastructure services, including high-
performance Elastic Cloud Server (ECS) and GPU-Acceleration Cloud Server
(GACS) services to support CCE clusters. You can choose the cluster type best
suited to your needs and quickly create clusters while CCE handles all the
complexity of cluster management.
Heterogeneous Network Access
Various network access modes and load balancing (layer-4 and layer-7) are
available to meet scenario-specific needs.
Choices of Persistent Storage Volumes
In addition to using local disk storage, CCE can store workload data using cloud
storage services. Currently, the following cloud storage services are supported:
Elastic Volume Service (EVS), Scalable File Service (SFS), and Object Storage
Service (OBS).
Affinity and Anti-affinity Scheduling
You can constrain which AZs and nodes your workloads are eligible or forbidden
to be scheduled on. You can also define rules to describe which workloads will or
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 735
Huawei Cloud Stack
Solution Description 12 Container Services
will not be co-located with your workloads. Affinity scheduling allows workloads
to be physically closer to user locations and makes routing paths between
containers as short as possible, which in turn reduces networking overhead. Anti-
affinity scheduling prevents single points of failure by banning co-location of pods
belonging to the same workload. It also prevents interfering workloads from
affecting each other by not allowing them to run on the same node or AZ.
Clusters and workloads can be resized both manually and automatically. Any auto
scaling policies can be flexibly combined to deal with in-the-moment load spikes.
12.1.2 Advantages
Why CCE?
CCE provides containers built on Docker and Kubernetes for enterprises who need
a great number of container clusters. With advantages such as high system
reliability, high performance, and high compatibility with open-source
communities, CCE containers meet the enterprises' demand.
Ease of Use
High Performance
● High availability: Each cluster has three master nodes, preventing a single
point of failure on the cluster control plane from affecting services. Nodes and
workloads in a cluster can be deployed across AZs to form a multi-active
architecture that ensures service continuity even when one of the nodes or
data centers is down or an AZ is hit by natural disasters.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 736
Huawei Cloud Stack
Solution Description 12 Container Services
● High security: Clusters with cloud accounts and Kubernetes RBAC capabilities
integrated are private and fully controlled by their tenants. The tenants can
assign different RBAC permissions to IAM users on the console.
Openness and Compatibility
● With the help of Docker, CCE facilitates the management of containerized
applications through automatic deployment, scheduling, networking, and
scaling.
● CCE is built on Kubernetes and compatible with Kubernetes native APIs,
kubectl (a command line interface), and Kubernetes/Docker native releases.
Updates from Kubernetes and Docker communities are regularly incorporated
into CCE.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 737
Huawei Cloud Stack
Solution Description 12 Container Services
Ease of use You have to install, Managing and using clusters can be
operate, and extend easy.
the cluster CCE enables you to create Kubernetes
management clusters in just a few clicks. Using CCE,
programs, configure the automatic deployment and O&M of
management system containerized applications can be
and monitoring performed on the console throughout
system, and fix bugs. their lifecycle.
CCE also provides standard Helm
charts that are out-of-the-box.
Using CCE clusters is as simple as
creating a container cluster and the
jobs that you want to run in the cluster.
CCE then automatically manages
clusters so you can only focus on
developing containerized applications.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 738
Huawei Cloud Stack
Solution Description 12 Container Services
Why Containers?
Docker is written in the Go language designed by Google. It provides OS-level
virtualization, including Linux Control Groups (cgroups), namespaces, and UnionFS
(for example, AUFS), to isolate each software process. The isolated software
processes, which are called containers, are independent from each other and from
the host.
Docker has moved forward to enhance isolation of file systems, network
connectivity, processes, and so on, which makes container creation and
management easier.
The traditional virtualization technology provides hardware-level virtualization. It
creates a set of VMs, each with a complete operating system and applications
inside. Containers, on the other hand, do not have their own kernel and all call
out to the same kernel of the host OS. Furthermore, it is unnecessary to do any
kind of virtualization the way it does with VMs. Therefore, Docker containers are
smaller and faster than VMs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 739
Huawei Cloud Stack
Solution Description 12 Container Services
For DevOps personnel, it would be ideal if applications can run anywhere after
one-time creation or configuration.
The use of Dockerfiles makes the DevOps process visible to everyone in a DevOps
team. In this way, the developer team can have a deeper understanding of the
application runtime environment and the conditions to run the applications, which
is helpful for optimizing the runtime environment.
Tiered storage and image technologies applied by Docker facilitate the reuse of
applications and simplify application maintenance and update as well as further
image extension based on base images. Docker joins hands with many open
source projects to maintain a large number of high-quality official images that can
be used directly in the production environment or as base images to build new
ones. This greatly reduces the image production costs.
Category Container VM
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 740
Huawei Cloud Stack
Solution Description 12 Container Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 741
Huawei Cloud Stack
Solution Description 12 Container Services
Microservice governance
Challenges
Internet technologies are evolving and complexity in large enterprise systems is
going beyond what traditional system architecture can handle. The microservice
architecture has been rising in popularity. The idea behind the microservice
architecture is to divide complex applications into smaller components called
microservices. Microservices are independently developed, deployed, and scaled. By
deploying microservices in containers, you can further simplify service delivery and
improve the reliability and scalability of your applications.
However, the complexity in O&M, commissioning, and security management of
the distributed application architecture increases as the quantity of microservices
grows. Developers cannot focus on application development. They have to write
additional code for microservice governance and are often distracted by the
tedious task of working out a microservice governance solution and letting it work
seamlessly with the existing application.
Solution
Application service mesh is deeply integrated into CCE. Its out-of-the-box traffic
management feature allows you to complete grayscale release, observe your
traffic, and control the flow of traffic without changing code.
Advantages
● Out-of-the-box usability
Istio service mesh can be started in just a few clicks and works seamlessly
with CCE. Once started, Istio service mesh can intelligently control the flow of
traffic.
● Intelligent routing
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 742
Huawei Cloud Stack
Solution Description 12 Container Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 743
Huawei Cloud Stack
Solution Description 12 Container Services
Advantages
● Efficient process management
Reduces scripting workload by more than 80% through streamlined process
interaction.
● Flexible integration
Provides various APIs to integrate with existing CI/CD systems, greatly
facilitating customization.
● High Performance
Schedules tasks flexibly with a fully containerized architecture.
Related Services
Software Repository for Container (SWR), Object Storage Service (OBS), Virtual
Private Network (VPN)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 744
Huawei Cloud Stack
Solution Description 12 Container Services
High-Performance AI Computing
Challenges
For industries such as AI, gene sequencing, and video processing, computing tasks
are computing-intensive and usually run on GPUs and other hardware that
provides high computing power. These industries opt to run computing services on
the public cloud where a sea of computing resources is available. Meanwhile, to
avoid the cost in using computing facilities at scale, general services are run in
private cloud.
Solution
Running containers on high-performance GPU-accelerated cloud servers
significantly improves AI computing performance by 3 to 5 folds. GPUs are usually
expensive and sharing a GPU among containers greatly reduces AI computing
costs. In addition to performance and cost advantages, CCE also offers fully
managed clusters that will hide all the complexity in deploying and managing
your AI applications so that you can focus on high-value development.
Advantages
● Efficient computing
GPUs are shared and scheduled among multiple containers, greatly reducing
computing costs.
● Extensive Field Experience
● AI containers are compatible with all mainstream GPU models and have been
used at scale in Enterprise Intelligence (EI) products.
Related Services
GPU-accelerated Cloud Server (GACS), Elastic Load Balance (ELB), Object Storage
Service (OBS)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 745
Huawei Cloud Stack
Solution Description 12 Container Services
12.1.4 Constraints
This section describes the notes and constraints on using CCE.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 746
Huawei Cloud Stack
Solution Description 12 Container Services
Networking
● By default, a NodePort Service is accessed within a VPC. To use an EIP to
access a NodePort Service through public networks, bind an EIP to the node in
the cluster in advance.
● LoadBalancer Services allow workloads to be accessed from public networks
through ELB. This access mode has the following restrictions:
– The automatically created load balancers cannot be used by other
resources. Otherwise, these load balancers will not be completely deleted.
● Constraints on network policies:
– The VPC network model does not support network policies.
– Network policies do not support egress rules.
● Constraints on network attachment definitions:
Only clusters whose network model is VPC (with IPv6 disabled) and Yangtse
support network attachment definitions. If the network model is tunnel
network, only default-network is displayed in the list and it cannot be added
or modified.
Volumes
● Constraints on EVS volumes:
– EVS disks cannot be attached across AZs and cannot be used by multiple
workloads, multiple pods of the same workload, or multiple tasks.
– The data sharing function of a shared disk is not supported between
nodes in a CCE cluster. If the same EVS disk is attached to multiple nodes,
read and write conflicts and data cache conflicts may occur. Therefore,
you are advised to create only one pod when creating a Deployment that
uses EVS disks.
– When you create a StatefulSet and add a cloud storage volume, existing
EVS volumes cannot be used.
– EVS disks that have partitions or have non-ext4 file systems cannot be
imported.
– Volumes cannot be created in specified enterprise projects. Only the
default enterprise project is supported.
– The ECS snapshot function affects CCE EVS disk storage volumes. Once
an ECS snapshot is created for a CCE service node, the EVS volumes used
by the workloads on this node cannot be attached to other nodes. In this
case, if a workload is migrated to another node, the workload will fail to
be started because the EVS volume cannot be attached.
● Constraints on SFS volumes:
– Volumes cannot be created in specified enterprise projects. Only the
default enterprise project is supported.
● Constraints on OBS volumes:
– Volumes cannot be created in specified enterprise projects. Only the
default enterprise project is supported.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 747
Huawei Cloud Stack
Solution Description 12 Container Services
Scaling
● The auto scaling is applied to worker nodes and workloads not to master
nodes.
● Constraints on workload scaling policies:
– HPA policies can be created only for clusters of v1.13 or later.
– CustomedHPA policies can be created only for clusters of v1.15 or later.
– Only one policy can be created for each workload. If you have created an
HPA policy, you cannot create a CustomedHPA policy or other HPA
policies for the workload. To create a new one, delete the created HPA
policy.
Other Constraints
The VDC name cannot be changed.
When using Huawei Cloud Stack CCE, operations can only be performed by
following the CCE operation guide.
Services
A Service is a Kubernetes resource object that defines a logical set of pods and a
policy by which to access them.
A maximum of 6,000 Services can be created in each namespace.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 748
Huawei Cloud Stack
Solution Description 12 Container Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 749
Huawei Cloud Stack
Solution Description 12 Container Services
Cluster
A cluster is a group of cloud servers (also known as nodes) in the same subnet. It
has all the cloud resources (including VPCs and compute resources) required for
running containers.
Node
A node is a cloud server (virtual or physical machine) running an instance of the
Docker Engine. Containers are deployed, run, and managed on nodes. The node
agent (kubelet) runs on each node to manage containers on the node. The
number of nodes in a cluster can be scaled.
Node Pool
A node pool contains one node or a group of nodes with identical configuration in
a cluster.
Security Group
A security group is a collection of access control rules for ECSs that have the same
security protection requirements and are mutually trusted in a VPC. After a
security group is created, you can create different access rules for the security
group to protect the ECSs associated with this security group.
Relationship Between Clusters, VPCs, Security Groups, and Nodes
As shown in Figure 12-8, a region may include multiple VPCs. A VPC consists of
one or more subnets. The subnets communicate with each other through a subnet
gateway. A cluster is created in a subnet. There are three scenarios:
● Different clusters are created in different VPCs.
● Different clusters are created in the same subnet.
● Different clusters are created in different subnets.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 750
Huawei Cloud Stack
Solution Description 12 Container Services
Figure 12-8 Relationship between clusters, VPCs, security groups, and nodes
Pod
A pod is the smallest and simplest unit in the Kubernetes object model that you
create or deploy. A pod encapsulates an application container (or, in some cases,
multiple containers), storage resources, a unique network IP address, and options
that govern how the containers should run.
Container
A container is a runtime instance of a Docker image. Multiple containers can run
on one node. Containers are basically software processes but have separate
namespaces and do not run directly on a host.
Workload
A workload is an abstract model of a group of pods in Kubernetes. Kubernetes
classifies workloads into Deployment, StatefulSet, DaemonSet, job, and cron job.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 751
Huawei Cloud Stack
Solution Description 12 Container Services
Orchestration Template
An orchestration template describes the definitions and dependencies between a
group of container services. You can use orchestration templates to deploy and
manage multi-container applications.
Image
Docker creates an industry standard for packaging containerized applications. A
Docker image is a special file system that includes everything needed to run
containers: programs, libraries, resources, and configuration files. It also contains
configuration parameters (such as anonymous volumes, environment variables,
and users) required within a container runtime. An image does not contain any
dynamic data. Its content remains unchanged after being built. When deploying
containerized applications, you can use images from Software Repository for
Container (SWR) or your private image registries. For example, a Docker image
can contain a complete Ubuntu operating system, in which only the required
programs and dependencies are installed.
Images become containers at runtime. That is, containers are created from
images. Containers can be created, started, stopped, deleted, and suspended.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 752
Huawei Cloud Stack
Solution Description 12 Container Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 753
Huawei Cloud Stack
Solution Description 12 Container Services
Namespace
A namespace is a collection of resources and objects. Multiple namespaces can be
created in a single cluster with data isolated from each other. This enables
namespaces to share the same cluster services without affecting each other.
Examples:
Service
A Service is an abstract method that exposes a group of applications running on
pods as networked services.
Kubernetes provides you with a service discovery mechanism without the need to
modify applications. In this mechanism, Kubernetes provides pods with their own
IP addresses and a single DNS for a group of pods, and balances load between
them.
Kubernetes allows you to specify a Service of a required type. The values and
actions of different types of Services are as follows:
Network Policy
Network policies provide policy-based network control to isolate applications and
reduce the attack surface. A network policy uses label selectors to simulate
traditional segmented networks and controls traffic between them and traffic
from outside.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 754
Huawei Cloud Stack
Solution Description 12 Container Services
ConfigMap
A ConfigMap is used to store configuration data or configuration files as key-value
pairs. ConfigMaps are similar to secrets, but provide a means of working with
strings that do not contain sensitive information.
Secret
Secrets resolve the configuration problem of sensitive data such as passwords,
tokens, and keys, and will not expose the sensitive data in images or pod specs. A
secret can be used as a volume or an environment variable.
Label
A label is a key-value pair and is associated with an object, for example, a pod.
Labels are used to identify special features of objects and are meaningful to users.
However, labels have no direct meaning to the kernel system.
Label Selector
Label selector is the core grouping mechanism of Kubernetes. It identifies a group
of resource objects with the same characteristics or attributes through the label
selector client or user.
Annotation
Annotations are defined in key-value pairs as labels are.
Labels have strict naming rules. They define the metadata of Kubernetes objects
and are used by label selectors.
PersistentVolume
A PersistentVolume (PV) is a network storage in a cluster. Similar to a node, it is
also a cluster resource.
PersistentVolumeClaim
A PersistentVolumeClaim (PVC) is a request for a PV. PVCs are similar to pods.
Pods consume node resources, and PVCs consume PV resources. Pods request CPU
and memory resources, and PVCs request data volumes of a specific size and
access mode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 755
Huawei Cloud Stack
Solution Description 12 Container Services
Node Affinity
By setting affinity labels, you can have pods scheduled to specific nodes.
Node Anti-Affinity
By setting anti-affinity labels, you can prevent pods from being scheduled to
specific nodes.
Pod Affinity
You can deploy pods onto the same node to reduce latency and the consumption
of network resources.
Pod Anti-Affinity
You can deploy pods of a workload onto different nodes to reduce the impact of
system breakdowns. Anti-affinity deployment is also recommended for workloads
that may interfere with each other.
Resource Quota
Resource quotas are used to limit the resource usage of users.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 756
Huawei Cloud Stack
Solution Description 12 Container Services
Environment Variable
An environment variable is a variable whose value can affect the way a running
container will behave. A maximum of 30 environment variables can be defined in
a container chart. You can modify environment variables even after workloads are
deployed, increasing flexibility in workload configuration.
This topic describes the mappings between CCE and Kubernetes terms.
CCE Kubernetes
Cluster Cluster
Node Node
Container Container
Image Image
Namespace Namespace
Deployment Deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 757
Huawei Cloud Stack
Solution Description 12 Container Services
CCE Kubernetes
StatefulSet StatefulSet
DaemonSet DaemonSet
Job Job
Pod Pod
Service Service
ClusterIP Cluster IP
NodePort NodePort
LoadBalancer LoadBalancer
Chart Template
ConfigMap ConfigMap
Secret Secret
Label Label
Annotation Annotation
Volume PersistentVolume
PersistentVolumeClaim PersistentVolumeClaim
Webhook Webhook
Endpoint Endpoint
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 758
Huawei Cloud Stack
Solution Description 12 Container Services
An ECS with multiple EVS disks is a node in CCE. You can choose ECS specifications
during node creation.
A VPC provides a logically isolated virtual network environment for ECSs. With
VPC, you have full control over your virtual networks, for example, assigning EIPs,
creating subnets, configuring DHCP, and configuring security groups. In addition,
VPCs can be connected to traditional data centers through VPN or leased lines to
flexibly integrate resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 759
Huawei Cloud Stack
Solution Description 12 Container Services
NAT gateway
The NAT Gateway service provides source network address translation (SNAT),
which translates private IP addresses to a public IP address by binding an elastic IP
address (EIP) to the gateway.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 760
Huawei Cloud Stack
Solution Description 12 Container Services
12.2.1 Introduction
SoftWare Repository for Container (SWR) allows you to easily manage the full
lifecycle of container images and facilitates secure deployment of images for your
applications.
SWR can either work with CCE or be used as an independent container image
repository.
Features
● Full lifecycle management of images
SWR manages the whole lifecycle of your container images, including push,
pull, and deletion.
● Private image repository and access control
Private image repository and fine-grained permission management allow you
to grant different access permissions, namely, read, write, and edit, to
different users.
● Large scale image distribution acceleration
SWR uses the image pull acceleration technology to ensure faster image pull
for CCE clusters in high concurrency scenarios.
● Automatic deployment update through triggers
Image deployment can be triggered automatically upon image update. Simply
set a trigger to the desired image. Every time the image is updated, the
application deployed with this image will be automatically updated.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 761
Huawei Cloud Stack
Solution Description 12 Container Services
Accessing SWR
The cloud platform provides a web-based management console and HTTPS-based
APIs through which you can access the SWR service.
● Using APIs
If you want to integrate SWR into a third-party system for secondary
development, use APIs to access SWR. For details, see SWR API Reference.
● Using the management console
Use this mode if you do not want to integrate SWR into a third-party system.
12.2.2 Advantages
Ease of Use
● You can directly push and pull container images without platform build or
O&M.
● SWR provides an easy-to-use management console for full lifecycle
management over container images.
Image Acceleration
SWR uses the image pull acceleration technology to ensure faster image pull for
CCE clusters in high concurrency scenarios.
Advantages
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 762
Huawei Cloud Stack
Solution Description 12 Container Services
Image
Images are like templates that include everything needed to run applications.
When deploying containerized applications, you can use images from the Docker
image center and your private image registries. For example, an image can
contain a complete Ubuntu operating system, in which only the required programs
and dependencies are installed. Docker images are used to create Docker
containers. Docker provides an easy way to create and update your own images.
You can also pull images created by other users.
Container
A container is a running instance of a Docker image. Multiple containers can run
on one node. Containers are actually software processes. Unlike traditional
software processes, containers have separate namespaces and do not run directly
on a host.
Images become containers at runtime, that is, containers are created from images.
Containers can be created, started, stopped, deleted, and suspended.
Repository
Image repositories are used for storing Docker images. An image repository hosts
different versions of a specific containerized application.
Organization
Organizations are used to isolate image repositories. With each organization being
limited to one company or department, images can be managed in a centralized
and efficient manner. A user can access different organizations as long as the user
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 763
Huawei Cloud Stack
Solution Description 12 Container Services
Quotas
Quotas are imposed on the number of organizations a userfirst-level VDC can
create. Table 12-4Table 12-5 lists the quotas imposed by SWR.
Organization 5
Organization 200
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 764
Huawei Cloud Stack
Solution Description 12 Container Services
Other Constraints
● Resource space names, VDC names, and tenant names cannot be modified.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 765
Huawei Cloud Stack
Solution Description 12 Container Services
With CTS, you can record operations associated with SWR for future query,
audit, and backtrack operations.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 766
Huawei Cloud Stack
Solution Description 13 Application Services
13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 767
Huawei Cloud Stack
Solution Description 13 Application Services
● The interconnected mail server supports Simple Mail Transfer Protocol (SMTP).
● The interconnected SMS server supports SMPP3_4, CMPP2_x, and CMPP3_x.
Function
When using SMN, you can create topics to communicate with subscribers. You can
publish messages to a topic you created or a topic you have permission to publish
messages to. You can publish messages to a topic, instead of sending them to
specific destination addresses. After you publish messages to the topic, SMN sends
the messages to all subscribers in the topic. Each topic has a unique topic name.
You specify a topic and publish messages to it. SMN then delivers them to all
subscribers in the topic.
13.1.2.1 Topic
A topic serves as a channel for publishing messages and subscribing to
notifications, through which publishers and subscribers can interact with each
other. A topic can be used to isolate messages. Publishers can use topics to send
assorted messages to various target subscriber groups.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 768
Huawei Cloud Stack
Solution Description 13 Application Services
13.1.2.3 Publisher
A publisher sends messages to a topic.
13.1.2.4 Subscriber
A subscriber receives messages delivered from a topic.
13.1.3 Advantages
SMN has the following advantages:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 769
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 770
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 771
Huawei Cloud Stack
Solution Description 13 Application Services
Workflow
Figure 13-4 shows the SMN workflow.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 772
Huawei Cloud Stack
Solution Description 13 Application Services
Service Description
Item Metric
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 773
Huawei Cloud Stack
Solution Description 13 Application Services
scenarios) as a tenant, click in the upper left corner of the page, select a
region, and select the cloud service.
● API
Use this mode if you need to integrate this service into a third-party system
for secondary development. For details, see the API reference of this service in
Simple Message Notification (SMN) 8.3.0 Usage Guide (for Huawei Cloud
Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 774
Huawei Cloud Stack
Solution Description 13 Application Services
ROMA Connect consists of four components: data integration (FDI, short for Fast
Data Integration), service integration (APIC, short for API Connect), message
integration (MQS, short for Message Queue Service), and device integration
(LINK).
FDI
FDI is a data integration component of ROMA Connect. FDI supports flexible, fast,
and non-intrusive data integration between multiple data sources, such as text,
messages, APIs, and relational and non-relational data. It implements data
integration across equipment rooms, data centers, and clouds, and supports
automatic deployment, O&M, and monitoring of integrated data.
For example, if an enterprise and its partners use different data sources, it is
difficult to achieve effective information transmission. FDI provides multiple
methods to convert mainstream data source formats such as MySQL, Kafka, and
API.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 775
Huawei Cloud Stack
Solution Description 13 Application Services
Function Description
Reliable data FDI can continuously monitor data in data channels and
transmission supports concurrent execution of more than 100 threads.
channel It monitors the message queue in real time and writes
data to the target queue in real time.
Alarms and FDI monitors the running status of data integration tasks
monitoring and processes abnormal tasks to ensure service running.
APIC
APIC is an API integration component of ROMA Connect. It opens data and
backend services as APIs to simplify data sharing and service provisioning and
reduce the cost on interconnection between enterprises. APIC provides SDKs and
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 776
Huawei Cloud Stack
Solution Description 13 Application Services
Custom backend The custom backend supports data APIs and function
APIs.
● A custom data API allows enterprises to connect a
database to APIC as a backend service and convert
data service capabilities into REST APIs.
● A custom function API is similar to a simplified
function service. You can compile custom scripts or
functions on the APIC backend as a backend service
for the frontend to invoke.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 777
Huawei Cloud Stack
Solution Description 13 Application Services
MQS
MQS is a message integration component of ROMA Connect. MQS based on Kafka
and RocketMQ uses a unified message access mechanism to provide enterprises
with secure and standard message channels for cross-network access.
For example, if an enterprise and its partners use different message systems,
interconnection between the message systems is costly, and message transmission
after the interconnection may not be reliable or secure. To address these issues,
the Kafka protocol can be used for communication between the enterprise and its
partners. In this way, MQS functions as a message transfer station to provide
secure and reliable message transmission. Specifically, the enterprise can create
multiple topics, set the permission for each partner to subscribe to these topics,
and publish messages to the topics. Then, partners can subscribe to the topics to
obtain messages.
LINK
LINK is a component of ROMA Connect for device integration. LINK uses the
standard Message Queue Telemetry Transport (MQTT) protocol to connect
devices, helping enterprises quickly and easily manage devices on the cloud.
In industrial scenarios, device information and parameters involved in the
production process are scattered. If a fault occurs in a production line, it takes a
long time to manually collect information and parameters for each device. LINK
connects devices to IT systems or big data platforms, and uploads information
such as device running status to these platforms so that enterprise customers can
see information about all devices graphically and therefore quickly locate faults. In
addition, enterprise customers can configure the upper thresholds for device
parameters to rule engines of LINK. If real-time parameters of a device are close
to the upper thresholds, an alarm notification is sent to users to remind them to
stop the device and perform maintenance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 778
Huawei Cloud Stack
Solution Description 13 Application Services
Message exchange You can configure a rule engine on the LINK console to
between devices and enable a device to communicate with other devices,
backend applications backends, and other cloud services.
LINK supports rule engines to forward data to MQS.
Third-party services obtain data through MQS to
implement asynchronous message communication
between devices and third-party services.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 779
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 780
Huawei Cloud Stack
Solution Description 13 Application Services
Leveraging the enterprise-class big data analysis solution, ROMA Connect helps
the manufacturing industry transform to IoT integration through data collection
and integration, and finally achieves the "smart" vision.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 781
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 782
Huawei Cloud Stack
Solution Description 13 Application Services
● Network differences
The networks used by the headquarters, branches, and partners are different.
Therefore, interconnection between the public networks, private networks,
and VPNs is difficult.
ROMA Connect helps corporation groups implement integration between the
headquarters and branches and between the groups and their partners. As shown
in Figure 13-9, ROMA Connect supports the following scenarios:
● Cross-regional integration: The headquarters, branches, and partners located
in different regions transmit their device information, data, and messages to
ROMA Connect. ROMA Connect performs operations such as device
information visualization, alarm monitoring, data conversion, and message
transmission to streamline regional restrictions, implement integration and
governance for regional businesses and share group information, ensuring the
reliability of service integration.
● Cross-cloud integration: APIC converts SaaS applications and third-party
cloud applications into API data. Then, enterprises call these APIs to integrate
different cloud applications, ensuring seamless interconnection between
services on the cloud.
● Cross-network integration: ROMA Connect is used to implement secure
cross-network interconnection with partners' service systems. Enterprises
upload data and information required by partners to ROMA Connect. ROMA
Connect then converts the data formats and integrates data based on the
partners' requirements. After an enterprise integrates data and messages,
partners can access ROMA Connect to obtain related information.
Application & data integration through ROMA Connect brings the following
benefits to enterprises:
– Builds a unified platform for managing multiple cloud services and
applications, simplifying management processes and helping enterprises
achieve digital transformation.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 783
Huawei Cloud Stack
Solution Description 13 Application Services
Edition Specifications
The following table lists the ROMA Connect instance specifications in each edition.
NOTE
High-availability (HA) and non-HA instances of the same edition provide the same service
capabilities, and differ only in reliability.
The numbers of connections and systems listed are for reference only. For details
about the number of resources (such as data integration tasks, APIs, and message
topics) that can be created, see Quota Limits. To ensure the performance of
ROMA Connect, create and use resources within the specified specifications.
● Number of systems: A system refers to a user's service system, and the
number of systems refers to the number of service systems interconnecting
with a ROMA Connect instance. You can set up multiple connections between
a service system and a ROMA Connect instance.
● Number of connections: A connection refers to an interaction between a
service system and ROMA Connect. The number of connections varies
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 784
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-9 Mappings between the number of resources and the number of
connections
Function Mapping
FDI Specifications
The following table lists the read and write performance of each data source when
a single task is running in an instance (for reference only). The running
performance of a single task is also affected by factors such as the network
bandwidth and data source server performance. When multiple tasks are running
concurrently in an instance, the performance deteriorates compared with that of a
single running task as multiple tasks preempt CPU and memory resources.
● Common tasks
The following table lists the reference performance of different types of data
sources of common data integration tasks supported by ROMA Connect.
MRS Hive 5 2
MRS HDFS 5 2
DWS 5 2
MySQL 6 3
Oracle 6 2
Kafka 10 8
SQL Server 6 3
PostgreSQL 4 2
Gauss100 6 3
FTP 5 3
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 785
Huawei Cloud Stack
Solution Description 13 Application Services
OBS 6 3
Redis / 2
HANA 6 3
API / /
NOTE
● When the DWS data source is used at the destination, the larger the destination
tables, the slower the write.
● The write and read rates of an API data source are directly related to the server API
response speed.
● In the performance test, a message of 1 KB is used. In actual application scenarios,
the rate is calculated based on 1 KB for messages within this limit.
● Composite tasks
The following table lists the reference performance of composite data
integration tasks supported by ROMA Connect.
12 1 million 1 1.2
50 1 million 1 0.8
APIC Specifications
The following table lists the APIC specifications supported by a ROMA Connect
instance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 786
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
NOTE
MQS Specifications
Open-source compatibility: ROMA Connect is fully compatible with open-source
Kafka 1.1.0, 2.3.0, and 2.7 and their APIs. It has all message processing features of
native Kafka. ROMA Connect is also compatible with open-source RocketMQ 4.8.0.
The following table lists the MQS specifications supported by a ROMA Connect
instance. When selecting the specifications, you are advised to reserve 30% of the
bandwidth to ensure stable running of your applications.
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 787
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 788
Huawei Cloud Stack
Solution Description 13 Application Services
LINK Specifications
ROMA Connect supports device access using MQTT 3.1 and MQTT 3.1.1. The
following table lists the LINK specifications supported by an instance.
NOTE
Basic 10,000 TPS for 20,000 1000 TPS for 20,000 online
online devices devices
Professional 15,000 TPS for 40,000 1500 TPS for 40,000 online
online devices devices
Enterprise 15,000 TPS for 100,000 2000 TPS for 100,000 online
online devices devices
Platinum 15,000 TPS for 500,000 5000 TPS for 500,000 online
online devices devices
Platinumx8-APIC 15,000 TPS for 500,000 5000 TPS for 500,000 online
online devices devices
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 789
Huawei Cloud Stack
Solution Description 13 Application Services
LDAP - Yes No No No
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 790
Huawei Cloud Stack
Solution Description 13 Application Services
WebSocket - Yes No No No
APIC
● APIC creates and opens APIs, supporting the following request protocols:
RESTful, SOAP, and WebSocket.
● Table 13-16 lists the data sources supported by APIC custom backends.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 791
Huawei Cloud Stack
Solution Description 13 Application Services
ClickHouse 21
DWS 1.3.4
Gauss100 FusionInsight_LibrA_V100R003C20,
FusionInsight_LibrA_V300R001C00
HANA 1.0
HIVE 2.3.2
MongoDB 3.4
Oracle 11g
PostgreSQL 11.0
MQS
Table 13-17 lists the message types supported by MQS.
RocketMQ 4.8.0
LINK
Table 13-18 lists the device access protocols supported by LINK.
Modbus -
OPC UA -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 792
Huawei Cloud Stack
Solution Description 13 Application Services
13.2.5 Quotas
Quota Limits
A quota refers to the maximum number of resources that you can create in a
ROMA Connect instance. The following table lists the resource quotas.
NOTE
The maximum quota may be slightly exceeded in case of high concurrency, but resource
usage will not be affected.
Number of environment 50
variables in a single API
group
Number of environments 10
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 793
Huawei Cloud Stack
Solution Description 13 Application Services
Number of ECSs in a 10
load balance channel
Number of custom 50
authorizers
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 794
Huawei Cloud Stack
Solution Description 13 Application Services
13.2.6 Constraint
FDI
FTP data If parsing is enabled, each file cannot exceed 200 MB (files
source exceeding 200 MB will be automatically skipped) and up to
1,500,000 data records can be parsed. If parsing is disabled,
each file cannot exceed 6 MB and up to 20,000 files can be
collected.
NOTE
Statistics on multiple files synchronization between FTP data sources
indicate the number of files synchronized this time.
OBS data If parsing is enabled, each file cannot exceed 200 MB (files
source exceeding 200 MB will be automatically skipped). If parsing is
disabled, each file cannot exceed 10 MB.
MRS Hive ● Hive supports only RCFile and TEXTFILE read and write.
data source ● When MRS Hive serves as the source, only tables of up to 1
million records can be synchronized.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 795
Huawei Cloud Stack
Solution Description 13 Application Services
Function Constraints
ClickHouse Only the following field types are supported: INT, FLOAT,
data source DECIMAL, STRING, UUID, DATETIME, DATE, ARRAY, and
enumeration data types.
Nesting and metadata are not supported.
Data tables of the Log, Buffer, Memory, and Set types are not
supported.
Kafka data The current Kafka data source can use SASL_SSL to connect to
source ROMA Connect's MQS, with AK/SK required (certificates are not
required). If you use a custom Kafka data source, username,
password, and certificate are required.
Oracle ● Only the following field types are supported. Fields support
database only uppercase letters.
CHAR, VARCHAR, DATE, NUMBER, FLOAT, LONG, NCHAR,
NVARCHAR2, RAW, TIMESTAMP
● The system time difference between the Oracle system and
the ROMA Connect server must be less than 2 minutes.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 796
Huawei Cloud Stack
Solution Description 13 Application Services
Function Constraints
DIS database Each channel supports only one task to collect source data.
WebSocket When you create a data integration task and set Parse to Yes,
database Parsing Path in Metadata must be configured. Otherwise, the
task will fail.
Composite ● Source
task (CDC) Scheduled: MySQL, Oracle, SQL Server, PostgreSQL/
openGauss, HANA
Real-time: MySQL, Oracle, SQL Server, GaussDB(for MySQL)
● Destination
Scheduled: MySQL, Oracle, PostgreSQL/openGauss, SQL
Server, HANA
Real-time: MySQL, Oracle, PostgreSQL/openGauss, Kafka,
SQL Server, GaussDB(for MySQL)
● The destination table must have a primary key. Otherwise,
data synchronization will be affected.
● The Oracle data source at the source can contain only tables
with uppercase table names and field names.
● The Oracle data source at the destination cannot contain
tables with lowercase field names.
● When you modify a composite task and add a source table
to it, the source table must contain data.
● Each table name can include up to 64 characters for
composite tasks.
● Automatic tasks map the first 2000 source/destination tables
and will fail if delayed over 1 minute by performance, load,
or network issues. If that happens, try manual mapping.
● Binary fields are not supported when defining real-time
composite tasks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 797
Huawei Cloud Stack
Solution Description 13 Application Services
Function Constraints
APIC
Data API The data body returned by a data API cannot exceed 10 MB.
response body
size
Number of data By default, a data API obtains 2000 records from the
records returned database. The excessive records cannot be returned.
by a data API
Request body size The request body of a hosting API cannot exceed 2 GB.
of a hosting API
for transparent
transmission
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 798
Huawei Cloud Stack
Solution Description 13 Application Services
Function Constraint
MQS
Faulty node If some nodes in the instance are faulty, topic management
(such as creation and deletion) cannot be performed.
Topic import ● Only XLSX, XLS, and CSV files can be imported.
● The description in the files to be imported cannot start
with an equal sign (=). Newline characters contained in the
description will be escaped.
● The number of topics in a file to be imported cannot
exceed 100.
Topic export Only XLSX, XLS, and CSV files can be exported.
Topic aging When you create or modify a topic on the console, the
time maximum aging time is 168 hours.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 799
Huawei Cloud Stack
Solution Description 13 Application Services
Consumer offset You can reset the retrieval start position to any time in the
reset last two days.
LINK
Maximum size of
a message
delivered by a
command
File types
supported by
product import
and export
File types
supported by rule
import and export
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 800
Huawei Cloud Stack
Solution Description 13 Application Services
Function Constraint
Maximum size of
a product import
file
Maximum size of
a rule import file
Server MQTT QoS Only QoS 0 and QoS 1 are supported. QoS 2 is not
levels supported.
Device access Only MQTT, OPC UA, and Modbus are supported.
protocol
13.2.7 Permissions
ROMA Connect Permissions
By default, new users do not have any permissions assigned. To assign permissions
to these new users, add them to one or more groups, and attach permissions
policies or roles to these groups.
You can grant users permissions by using roles and policies.
● Roles: A type of coarse-grained authorization mechanism to define
permissions related to user responsibilities. There are only a limited number of
roles for granting permissions to users. When using roles to grant permissions,
you may also need to assign other roles on which the permissions depend.
However, roles are not an ideal choice for fine-grained authorization and
secure access control.
● Policies: A type of fine-grained authorization mechanism to define
permissions required to perform operations on specific cloud resources under
certain conditions. This mechanism allows for more flexible policy-based
authorization and secure access control.
Table 13-25 lists all the system roles supported by ROMA Connect.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 801
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-26 lists the common operations supported by each system-defined policy
of ROMA Connect. Select the proper system-defined policies as required.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 802
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 803
Huawei Cloud Stack
Solution Description 13 Application Services
Environment
An environment refers to the usage scope of an API. You can call an API only after
you publish it in an environment. You can publish APIs in different custom
environments, such as the development environment and test environment.
RELEASE is the default environment for formal publishing.
Environment Variable
Environment variables are specific to environments. You can create environment
variables in different environments to call different backend services by using the
same API.
Producer
A producer is a party that publishes messages into topics. The messages will be
then delivered to other systems for processing.
Consumer
A consumer is a party that subscribes to messages from topics. The ultimate
purpose of subscribing to messages is to process the message content. For
example, in a log integration scenario, the alarm monitoring platform functions as
a consumer to subscribe to log messages from topics, identify alarm logs, and
send alarm messages or emails.
Partition
A topic is a place holder of your messages in Kafka and is further divided into
partitions. Messages are stored in different partitions in a distributed manner,
implementing horizontal expansion and high availability of Kafka.
Replica
To improve message reliability, each partition of Kafka has multiple replicas to
back up messages. Each replica stores all data of a partition and synchronizes
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 804
Huawei Cloud Stack
Solution Description 13 Application Services
messages with other replicas. A partition has one replica as the leader which
handles the creation and retrieval of all messages. The rest replicas are followers
which replicate the leader.
The topic is a logical concept, whereas the partition and broker are physical
concepts. The following figure shows the relationship between partitions, brokers,
and topics of Kafka based on the message production and consumption directions.
Topic
A topic is a model for publishing and subscribing to messages in a message queue.
Messages are produced, consumed, and managed based on topics. A producer
publishes a message to a topic. Multiple consumers subscribe to the topic. The
producer does not have a direct relationship with the consumers.
Product
A product is a collection of devices with the same capabilities or features. Each
device belongs to a product. You can define a product to determine the functions
and attributes of a device.
Thing Model
A thing model defines the service capabilities of a device, that is, what the device
can do and what information the device can provide for external systems. After
the capabilities of a device are divided into multiple thing model services, define
the attributes, commands, and command fields of each thing model service.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 805
Huawei Cloud Stack
Solution Description 13 Application Services
Rule Engine
A rule engine allows you to configure forwarding rules so that data reported by
devices can be forwarded to other cloud services for storage or further analysis.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 806
Huawei Cloud Stack
Solution Description 13 Application Services
Introduction
ROMA Connect service instances allow service components to be deployed at
different sites (or physical equipment rooms). The power supply and network of
different equipment rooms are isolated from each other. If an equipment room is
faulty due to a power or network fault, the components in the other equipment
room continue to provide services. The primary and standby components or a new
cluster will be selected to ensure that the cluster is available. Upon network
partition isolation, the arbitration center determines which equipment room
component is the main component to prevent split-brain.
● For intra-city active-active DR, you only need to select two AZs for the HA
specifications when creating an instance.
● HA instances are deployed in a cluster with twice the common specifications
to ensure that the instance performance does not deteriorate if a single
equipment room is faulty.
Recovery Time
When a fault occurs in an equipment room, the recovery time of the ROMA
Connect HA instances depends on the switchover time (about 10 minutes) of the
cloud platform management plane. After the management plane is recovered, it
takes a maximum of 15 minutes for the instances to recover.
● Data integration: If a single equipment room is faulty, the tasks that are
being scheduled on the node in the faulty equipment room will fail. The failed
tasks can be triggered in the next scheduling period.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 807
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 808
Huawei Cloud Stack
Solution Description 13 Application Services
Instance The usage methods are the same, including GUI operations and
usage service access.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 809
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 810
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 811
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
DCS Redis 3.0 instances have been taken offline at new sites, but can still be used at
existing sites. DCS Redis 4.0 or 5.0 instances are recommended.
You cannot upgrade the Redis version for an instance. For example, a single-node DCS Redis
4.0 instance cannot be upgraded to a single-node DCS Redis 5.0 instance. If your service
requires the features of higher Redis versions, create a DCS Redis instance of a higher
version and then migrate data from the old instance to the new one.
Features
1. Low system overhead and high QPS
Single-node instances do not support data synchronization or data
persistence, reducing system overhead and supporting higher concurrency.
QPS of single-node DCS Redis instances reaches up to 50,000.
2. Process monitoring and automatic fault recovery
With an HA monitoring mechanism, if a single-node DCS instance becomes
faulty, a new process is started within 30 seconds to resume service
provisioning.
3. Out-of-the-box usability and no data persistence
Single-node DCS instances can be used out of the box because they do not
involve data loading. If your service requires high QPS, you can warm up the
data beforehand to avoid strong concurrency impact on the backend
database.
4. Low-cost and suitable for development and testing
Single-node instances are 40% cheaper than master/standby DCS instances,
suitable for setting up development or testing environments.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 812
Huawei Cloud Stack
Solution Description 13 Application Services
Architecture
Figure 13-12 shows the architecture of single-node DCS Redis instances.
NOTE
To access a DCS Redis 3.0 instance, you must use port 6379. To access a DCS Redis 4.0/5.0
instance, you can customize the port. If no port is specified, the default port 6379 will be
used. In the following architecture, port 6379 is used. If you have customized a port, replace
6379 with the actual port.
Architecture description:
● VPC
All server nodes of the instance run in the same VPC.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 813
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
For intra-VPC access, the client and the instance must be in the same VPC with
specified security group rule configurations.
For details, see Distributed Cache Service (DCS) 2.0.0 User Guide (for Huawei Cloud
Stack 8.3.0) > "FAQs" > "Client and Network Connection" > "Security Group
Configurations".
● Application
The client of the instance, which is the application running on an Elastic Cloud
Server (ECS).
DCS Redis instances are compatible with the Redis protocol, and can be
accessed through open-source clients. For details about accessing DCS
instances, see Distributed Cache Service (DCS) 2.0.0 Developer Guide (for
Huawei Cloud Stack 8.3.0) > "Accessing an Instance".
● DCS instance
A single-node DCS instance, which has only one node and one Redis process.
DCS monitors the availability of the instance in real time. If the Redis process
becomes faulty, DCS starts a new process to resume service provisioning.
NOTE
DCS Redis 3.0 instances have been taken offline at new sites, but can still be used at
existing sites. DCS Redis 4.0 or 5.0 instances are recommended.
You cannot upgrade the Redis version for an instance. For example, a master/standby DCS
Redis 4.0 instance cannot be upgraded to a master/standby DCS Redis 5.0 instance. If your
service requires the features of higher Redis versions, create a DCS Redis instance of a
higher version and then migrate data from the old instance to the new one.
Features
Master/Standby DCS instances have higher availability and reliability than single-
node DCS instances.
Master/Standby DCS instances have the following features:
1. Data persistence and high reliability
By default, data persistence is enabled by both the master and the standby
node of a master/standby instance.
The standby node of a DCS Redis instance is invisible to you. Only the master
node provides data read/write operations.
2. Data synchronization
Data in the master and standby nodes is kept consistent through incremental
synchronization.
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 814
Huawei Cloud Stack
Solution Description 13 Application Services
Architecture description:
● VPC
All server nodes of the instance run in the same VPC.
NOTE
For intra-VPC access, the client and the instance must be in the same VPC with
specified security group rule configurations.
For details, see Distributed Cache Service (DCS) 2.0.0 User Guide (for Huawei Cloud
Stack 8.3.0) > "FAQs" > "Client and Network Connection" > "Security Group
Configurations".
● Application
The Redis client of the instance, which is the application running on the ECS.
DCS Redis instances are compatible with the Redis protocol, and can be
accessed through open-source clients. For details about accessing DCS
instances, see Distributed Cache Service (DCS) 2.0.0 Developer Guide (for
Huawei Cloud Stack 8.3.0).
● DCS instance
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 815
Huawei Cloud Stack
Solution Description 13 Application Services
Architecture description:
1. Master/standby DCS Redis 4.0/5.0 instances support Sentinels. Sentinels
monitor the running status of the master and standby nodes. If the master
node becomes faulty, a failover will be performed.
Sentinels are invisible to you and is used only in the service.
2. A standby node has the same specifications as a master node. A master/
standby instance consists of a pair of master and standby nodes by default.
3. To access a DCS Redis 4.0/5.0 instance, you can customize the port. If no port
is specified, the default port 6379 will be used. In the architecture diagram,
port 6379 is used. If you have customized a port, replace 6379 with the actual
port.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 816
Huawei Cloud Stack
Solution Description 13 Application Services
● A Proxy Cluster instance can be connected in the same way that a single-node or
master/standby instance is connected, without any special settings on the client. You
can use the IP address of the instance, and do not need to know or use the proxy or
shard addresses.
● You cannot upgrade the Redis version for an instance. For example, a Proxy Cluster DCS
Redis 4.0 instance cannot be upgraded to a Proxy Cluster DCS Redis 5.0 instance. If your
service requires the features of higher Redis versions, create a DCS Redis instance of a
higher version and then migrate data from the old instance to the new one.
● DCS Redis 3.0 instances have been taken offline at new sites, but can still be used at
existing sites. DCS Redis 4.0 or 5.0 instances are recommended.
● Redis 4.0 and 5.0 depend on ELB.
64 GB 3 8
128 GB 6 16
256 GB 8 32
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 817
Huawei Cloud Stack
Solution Description 13 Application Services
Architecture description:
● VPC
All server nodes of the instance run in the same VPC.
NOTE
For intra-VPC access, the client and the instance must be in the same VPC with
specified security group rule configurations.
For details, see Distributed Cache Service (DCS) 2.0.0 User Guide (for Huawei Cloud
Stack 8.3.0) > "FAQs" > "Client and Network Connection" > "Security Group
Configurations".
● Application
The client used to access the instance.
DCS Redis instances can be accessed through open-source clients. For details
about accessing DCS instances, see Distributed Cache Service (DCS) 2.0.0
Developer Guide (for Huawei Cloud Stack 8.3.0) > "Accessing an Instance".
● LB-M/LB-S
The load balancers, which are deployed in master/standby HA mode. The
connection addresses (IP address:Port) of the cluster DCS Redis instance are
the addresses of the load balancers.
● Proxy
The proxy server used to achieve high availability and process high-
concurrency client requests.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 818
Huawei Cloud Stack
Solution Description 13 Application Services
You can connect to a Proxy Cluster instance at the IP addresses of its proxies.
● Redis shard
A shard of the cluster.
Each shard consists of a pair of master/standby nodes. If the master node
becomes faulty, the standby node automatically takes over cluster services.
If both the master and standby nodes of a shard are faulty, the cluster can
still provide services but the data on the faulty shard is inaccessible.
● Cluster manager
The cluster configuration managers, which store configurations and
partitioning policies of the cluster. You cannot modify the information about
the configuration managers.
Table 13-31 Specifications of Proxy Cluster DCS Redis 4.0 and 5.0 instances
4 GB 3 3 1.33
8 GB 3 3 2.67
16 GB 3 3 5.33
24 GB 3 3 8
32 GB 3 3 10.67
48 GB 6 6 8
64 GB 8 8 8
96 GB 12 12 8
128 GB 16 16 8
192 GB 24 24 8
256 GB 32 32 8
384 GB 48 48 8
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 819
Huawei Cloud Stack
Solution Description 13 Application Services
512 GB 64 64 8
768 GB 96 96 8
Figure 13-16 Architecture of a Proxy Cluster DCS Redis 4.0 or 5.0 instance
Architecture description:
● VPC
All server nodes of the instance run in the same VPC.
● Application
The client used to access the instance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 820
Huawei Cloud Stack
Solution Description 13 Application Services
DCS Redis instances can be accessed through open-source clients. For details
about accessing DCS instances in different languages, see Distributed Cache
Service (DCS) 2.0.0 Developer Guide (for Huawei Cloud Stack 8.3.0) >
"Accessing an Instance".
● VPC endpoint service
You can configure your DCS Redis instance as a VPC endpoint service and
access the instance at the VPC endpoint service address.
The IP address of the Proxy Cluster DCS Redis instance is the address of the
VPC endpoint service.
● ELB
The load balancers, which are deployed in cluster HA mode.
● Proxy
The proxy server used to achieve high availability and process high-
concurrency client requests.
You cannot connect to a Proxy Cluster instance at the IP addresses of its
proxies.
● Redis cluster
A shard of the cluster.
Each shard consists of a pair of master/replica nodes. If the master node
becomes faulty, the replica node automatically takes over cluster services.
If both the master and standby nodes of a shard are faulty, the cluster can
still provide services but the data on the faulty shard is inaccessible.
Redis Cluster
The Redis Cluster instance type provided by DCS is compatible with the native
Redis Cluster, which uses smart clients and a distributed architecture to perform
sharding.
Table 13-32 lists the shard specification for different instance specifications.
Size of a shard = Instance specification/Number of shards. For example, if a 48
GB instance has 6 shards, the size of each shard is 48 GB/6 = 8 GB.
48 GB 6
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 821
Huawei Cloud Stack
Solution Description 13 Application Services
64 GB 8
96 GB 12
128 GB 16
192 GB 24
256 GB 32
384 GB 48
512 GB 64
768 GB 96
1024 GB 128
● Distributed architecture
Any node in a Redis Cluster can receive requests. Received requests are then
redirected to the right node for processing. Each node consists of a subset of
one master and one (by default) or multiple replicas. The master or replica
roles are determined through an election algorithm.
● Presharding
There are 16,384 hash slots in each Redis Cluster. The mapping between hash
slots and Redis nodes is stored in Redis Servers. To compute what is the hash
slot of a given key, simply take the CRC16 of the key modulo 16384. Example
command output
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 822
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 823
Huawei Cloud Stack
Solution Description 13 Application Services
Architecture
Architecture description:
● VPC endpoint service
You can configure your DCS Redis instance as a VPC endpoint service and
access the instance at the VPC endpoint service address.
The IP address of the read/write splitting DCS Redis instance is the address of
the VPC endpoint service.
● ELB
The load balancers are deployed in cluster HA mode and support multi-AZ
deployment.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 824
Huawei Cloud Stack
Solution Description 13 Application Services
● Proxy
A proxy cluster is used to distinguish between read requests and write
requests, and forward write requests to the master node and read requests to
the standby node. You do not need to configure the client.
● Sentinel cluster
Sentinels monitor the status of the master and replicas. If the master node is
faulty or abnormal, a failover is performed to ensure that services are not
interrupted.
● Master/standby instance
A read/write splitting instance is essentially a master/standby instance that
consists of a master node and a standby node. By default, data persistence is
enabled and data is synchronized between the two nodes.
The master and standby nodes can be deployed in different AZs.
Single-Node Instances
For each single-node DCS Redis instance, the available memory is less than the
total memory because some memory is reserved for system overheads, as shown
in the following table.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 825
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
Master/Standby Instances
For each master/standby DCS Redis instance, the available memory is less than
that of a single-node DCS Redis instance because some memory is reserved for
data persistence, as shown in the following table. The available memory of a
master/standby instance can be adjusted to support background tasks such as
data persistence and master/standby synchronization.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 826
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 827
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 828
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
● DCS Redis 4.0 and 5.0 instances are available in single-node, master/standby, Proxy
Cluster, Redis Cluster, and read/write splitting types.
● Supported CPU architecture: x86 and Arm.
Single-Node Instances
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 829
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 830
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
Master/Standby Instances
By default, a master/standby instance has two replicas (including the master).
There is one master node.
Number of IP addresses occupied by a master/standby instance = Number of
master nodes x Number of replicas. For example:
2 replicas: Number of occupied IP addresses = 1 x 2 = 2
3 replicas: Number of occupied IP addresses = 1 x 3 = 3
The following table lists the specification codes (spec_code) when there are two
default replicas. Change the replica quantity in the specification codes based on
the actual number of replicas. For example, if an 8 GB master/standby x86-based
instance has two replicas, its specification code is redis.ha.xu1.large. r2.8. If it has
three replicas, its specification code is redis.ha.xu1.large. r3.8.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 831
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 832
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 833
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
Table 13-38 Specifications of Proxy Cluster DCS Redis 4.0 and 5.0 instances
Total Availabl Max. Assured/ Reference Specification
Memor e Connecti Maximu Performance Code (spec_code
y Memory ons m (QPS) in the API)
(GB) (GB) (Default/ Bandwidt
Limit) h
(Count) (Mbit/s)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 834
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 835
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 836
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 837
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-39 Specifications of Redis Cluster DCS Redis 4.0 or 5.0 instances
Total Availabl Shard Max. Assured/ Refere Specificati
Memor e s Connectio Maximum nce on Code
y Memory (Mast ns Bandwidth Perfor (spec_code
(GB) (GB) er (Default/ (Mbit/s) mance in the API)
Nodes Limit) (QPS)
) (Count)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 838
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 839
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 840
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 841
Huawei Cloud Stack
Solution Description 13 Application Services
b. Read/write splitting is suitable when there are more read requests than
write requests. If there are a lot of write requests, the master and replicas
may be disconnected, or the data synchronization between them may fail
after the disconnection. As a result, the read performance deteriorates.
If your services are write-heavy, use master/standby or cluster instances.
c. If a replica is faulty, it takes some time to synchronize all data from the
master. During the synchronization, the replica does not provide services,
and the read performance of the instance deteriorates.
To reduce the impact of the interruption, use an instance with less than
32 GB memory. The smaller the memory, the shorter the time for full
data synchronization between the master and replicas, and the smaller
the impact of the interruption.
Table 13-40 Specifications of read/write splitting DCS Redis 4.0 or 5.0 instances
Total Available Replicas Max. Assured/ Referenc Specificat
Memo Memory (Includin Connecti Maximu e ion Code
ry (GB) g ons m Perform (spec_cod
Masters) (Default/ Bandwid ance e in the
Limit) th (QPS) API)
(Mbit/s)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 842
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 843
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 844
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 845
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 846
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 847
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 848
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 849
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 850
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
DCS Redis 3.0 instances have been taken offline at new sites, but can still be used at
existing sites. DCS Redis 4.0 or 5.0 instances are recommended.
DCS for Redis instances support most Redis commands, which are listed in
Commands Supported by DCS for Redis 3.0. Any client compatible with the
Redis protocol can access DCS.
● For security purposes, some Redis commands are disabled in DCS, as listed in
Commands Disabled by DCS for Redis 3.0.
● Some Redis commands are supported by cluster DCS instances for multi-key
operations in the same slot. For details, see 13.3.5.5 Command Restrictions.
● Some Redis commands have usage restrictions, which are described in
13.3.5.6 Other Command Usage Restrictions.
NOTE
● Commands available since later Redis versions are not supported by earlier-version
instances. Run a command on redis-cli to check whether it is supported by DCS for
Redis. If the message "(error) ERR unknown command" is returned, the command is not
supported.
● The following commands listed in the tables are not supported by Proxy Cluster
instances:
● List group: BLPOP, BRPOP, and BRPOPLRUSH
● CLIENT commands in the Server group: CLIENT KILL, CLIENT GETNAME, CLIENT
LIST, CLIENT SETNAME, CLIENT PAUSE, and CLIENT REPLY.
● Server group: MONITOR
● Key group: RANDOMKE (for old Proxy Cluster instances)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 851
Huawei Cloud Stack
Solution Description 13 Application Services
- SETBIT - - - - -
- SETEX - - - - -
- SETNX - - - - -
- SETRANG - - - - -
E
- STRLEN - - - - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 852
Huawei Cloud Stack
Solution Description 13 Application Services
MIGRATE SLAVEOF
- SHUTDOWN
- LASTSAVE
- DEBUG commands
- COMMAND
- SAVE
- BGSAVE
- BGREWRITEAOF
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 853
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-44 Redis commands disabled in Proxy Cluster Redis 3.0 instances
Keys Server List Transactio Connecti Cluste codis
ns on r
- SAVE - - - - SLOTSCHE
CK
- BGSAVE - - - - SLOTSMG
RTTAGSLO
T
- BGREWRIT - - - - SLOTSMG
EAOF RTTAGON
E
- SYNC - - - - -
- PSYNC - - - - -
- MONITOR - - - - -
- CLIENT - - - - -
command
s
- OBJECT - - - - -
- ROLE - - - - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 854
Huawei Cloud Stack
Solution Description 13 Application Services
DCS for Redis instances support most Redis commands, which are listed in
Commands Supported by DCS for Redis 4.0. Any client compatible with the
Redis protocol can access DCS.
● For security purposes, some Redis commands are disabled in DCS, as listed in
Commands Disabled by DCS for Redis 4.0.
● Some Redis commands are supported by cluster DCS instances for multi-key
operations in the same slot. For details, see 13.3.5.5 Command Restrictions.
● Some Redis commands have usage restrictions, which are described in
13.3.5.6 Other Command Usage Restrictions.
Table 13-47 and Table 13-48 list the Redis commands supported by Proxy Cluster
DCS Redis 4.0 instances.
Table 13-49 and Table 13-50 list the Redis commands supported by read/write
splitting DCS Redis 4.0 instances.
NOTE
● Commands available since later Redis versions are not supported by earlier-version
instances. Run a command on redis-cli to check whether it is supported by DCS for
Redis. If the message "(error) ERR unknown command" is returned, the command is not
supported.
● For DCS Redis 4.0 instances in the Redis Cluster mode, ensure that all commands in a
pipeline are executed on the same shard.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 855
Huawei Cloud Stack
Solution Description 13 Application Services
- SETEX - - - ZREMRANGE -
BYSCORE
- SETNX - - - ZREM -
- SETRAN - - - - -
GE
- STRLEN - - - - -
- BITFIEL - - - - -
D
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 856
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-47 Commands supported by Proxy Cluster DCS Redis 4.0 instances (1)
Keys String Hash List Set Sorted Server
Set
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 857
Huawei Cloud Stack
Solution Description 13 Application Services
- STRLEN - - - ZREVRA -
NGEBYLE
X
- BITFIELD - - - - -
- GETBIT - - - - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 858
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-48 Commands supported by Proxy Cluster DCS Redis 4.0 instances (2)
- - - CLIENT - GEOSEAR -
SETNAM CHSTORE
E
Table 13-49 Commands supported by read/write splitting DCS Redis 4.0 instances
(1)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 859
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 860
Huawei Cloud Stack
Solution Description 13 Application Services
- BITFIELD - - - - -
- GETBIT - - - - -
Table 13-50 Commands supported by read/write splitting DCS Redis 4.0 instances
(2)
HyperLogl Pub/Sub Transacti Connecti Scripting Geo
og ons on
- - - CLIENT - GEOSEARCHST
GETNAM ORE
E
- - - CLIENT - -
SETNAM
E
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 861
Huawei Cloud Stack
Solution Description 13 Application Services
Keys Server
MIGRATE SLAVEOF
- SHUTDOWN
- LASTSAVE
- DEBUG commands
- COMMAND
- SAVE
- BGSAVE
- BGREWRITEAOF
- SYNC
- PSYNC
Table 13-52 Redis commands disabled in Proxy Cluster DCS Redis 4.0 instances
- DEBUG SEGFAULT - -
- LASTSAVE - -
- PSYNC - -
- SAVE - -
- SHUTDOWN - -
- SLAVEOF - -
- LATENCY commands - -
- MODULE commands - -
- LOLWUT - -
- SWAPDB - -
- REPLICAOF - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 862
Huawei Cloud Stack
Solution Description 13 Application Services
- SYNC - -
Table 13-53 Redis commands disabled in Redis Cluster Redis 4.0 instances
- - CLUSTER FAILOVER
- - CLUSTER SET-CONFIG-EPOCH
- - CLUSTER RESET
Table 13-54 Commands disabled in read/write splitting DCS Redis 4.0 instances
- - LASTSAVE -
- - LOLWUT -
- - MODULE LIST/ -
LOAD/UNLOAD
- - PSYNC -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 863
Huawei Cloud Stack
Solution Description 13 Application Services
- - REPLICAOF -
- - SAVE -
- - SHUTDOWN -
[NOSAVE|SAVE]
- - SLAVEOF -
- - SWAPDB -
- - SYNC -
This section describes DCS for Redis 5.0's compatibility with Redis commands,
including supported and disabled commands. For more information about the
command syntax, visit the Redis official website.
DCS for Redis instances support most Redis commands. Any client compatible with
the Redis protocol can access DCS.
● For security purposes, some Redis commands are disabled in DCS, as listed in
Commands Disabled by DCS for Redis 5.0.
● Some Redis commands are supported by cluster DCS instances for multi-key
operations in the same slot. For details, see 13.3.5.5 Command Restrictions.
● Some Redis commands have usage restrictions, which are described in
13.3.5.6 Other Command Usage Restrictions.
● Commands available since later Redis versions are not supported by earlier-version
instances. Run a command on redis-cli to check whether it is supported by DCS for
Redis. If the message "(error) ERR unknown command" is returned, the command is not
supported.
● For DCS Redis 5.0 instances in the Redis Cluster mode, ensure that all commands in a
pipeline are executed on the same shard.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 864
Huawei Cloud Stack
Solution Description 13 Application Services
- SETEX - - - ZPOPMIN -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 865
Huawei Cloud Stack
Solution Description 13 Application Services
- SETNX - - - ZPOPMAX -
- SETRAN - - - ZREMRANGE -
GE BYSCORE
- STRLEN - - - ZREM -
- BITFIEL - - - - -
D
- - - - - - XLEN
- - - - - - XPENDING
- - - - - - XRANGE
- - - - - - XREAD
- - - - - - XREADGR
OUP
- - - - - - XREVRANG
E
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 866
Huawei Cloud Stack
Solution Description 13 Application Services
- - - - - - XTRIM
Table 13-57 Commands supported by Proxy Cluster DCS Redis 5.0 instances (1)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 867
Huawei Cloud Stack
Solution Description 13 Application Services
- BITFIELD - - - ZPOPMI -
N
- GETBIT - - - BZPOPM -
AX
- - - - - BZPOPMI -
N
- - - - - ZREVRA -
NGEBYLE
X
Table 13-58 Commands supported by Proxy Cluster DCS Redis 5.0 instances (2)
HyperLogl Pub/Sub Transacti Connecti Scripting Geo
og ons on
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 868
Huawei Cloud Stack
Solution Description 13 Application Services
- - - CLIENT - GEOSEARCHST
SETNAM ORE
E
Table 13-59 Commands supported by read/write splitting DCS Redis 5.0 instances
(1)
Keys String Hash List Set Sorted Server
Set
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 869
Huawei Cloud Stack
Solution Description 13 Application Services
- GETBIT - - - ZPOPMA -
X
- - - - - ZPOPMI -
N
- - - - - ZREVRA -
NGEBYLE
X
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 870
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-60 Commands supported by read/write splitting DCS Redis 5.0 instances
(2)
HyperLogl Pub/Sub Transacti Connecti Scripting Geo
og ons on
- - - CLIENT - GEOSEARCHST
GETNAM ORE
E
- - - CLIENT - -
SETNAM
E
MIGRATE SLAVEOF
- SHUTDOWN
- LASTSAVE
- DEBUG commands
- COMMAND
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 871
Huawei Cloud Stack
Solution Description 13 Application Services
Keys Server
- SAVE
- BGSAVE
- BGREWRITEAOF
- SYNC
- PSYNC
Table 13-62 Redis commands disabled in Proxy Cluster DCS Redis 5.0 instances
Keys Server Sorted Set Cluster
RANDOMKEY CLIENT - -
commands
- DEBUG SEGFAULT - -
- LASTSAVE - -
- PSYNC - -
- SAVE - -
- SHUTDOWN - -
- SLAVEOF - -
- LATENCY - -
commands
- MODULE - -
commands
- LOLWUT - -
- SWAPDB - -
- REPLICAOF - -
- SYNC - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 872
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-63 Redis commands disabled in Redis Cluster Redis 5.0 instances
Keys Server Cluster
- - CLUSTER FAILOVER
- - CLUSTER SET-CONFIG-EPOCH
- - CLUSTER RESET
Table 13-64 Commands disabled in read/write splitting DCS Redis 5.0 instances
Cluster Keys Server
- - DEBUG OBJECT
- - DEBUG SEGFAULT
- - LASTSAVE
- - LOLWUT
- - MODULE LIST/LOAD/
UNLOAD
- - PSYNC
- - REPLICAOF
- - SAVE
- - SHUTDOWN [NOSAVE|
SAVE]
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 873
Huawei Cloud Stack
Solution Description 13 Application Services
- - SLAVEOF
- - SWAPDB
- - SYNC
Currently, only DCS for Redis 4.0 and later support Web CLI.
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 874
Huawei Cloud Stack
Solution Description 13 Application Services
- PSETEX - - ZSCAN -
- SET - - ZRANGEBYLEX -
- SETBIT - - ZLEXCOUNT -
- SETEX - - - -
- SETNX - - - -
- SETRANG - - - -
E
- STRLEN - - - -
- BITFIELD - - - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 875
Huawei Cloud Stack
Solution Description 13 Application Services
HKEYS - - - - -
HMGET - - - - -
HMSET - - - - -
HSET - - - - -
HSETNX - - - - -
HVALS - - - - -
HSCAN - - - - -
HSTRLEN - - - - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 876
Huawei Cloud Stack
Solution Description 13 Application Services
- PSYNC - -
- ACL - -
- MODULE - -
BLMOVE - BZMPOP -
BRPOPLPUSH - - -
BLMPOP - - -
Category Description
Set
SUNION Returns the members of the set resulting from the union
of all the given sets.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 877
Huawei Cloud Stack
Solution Description 13 Application Services
Category Description
HyperLogLog
Keys
RPOPLPUSH Returns and removes the last element (tail) of the list
stored at source, and pushes the element at the first
element (head) of the list stored at destination.
String
NOTE
While running commands that take a long time to run, such as FLUSHALL, DCS instances
may not respond to other commands and may change to the faulty state. After the
command finishes executing, the instance will return to normal.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 878
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-71 Redis commands restricted for Proxy Cluster DCS Redis 4.0 instances
Category Command Restriction
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 879
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 880
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 881
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 882
Huawei Cloud Stack
Solution Description 13 Application Services
XCLAIM
XDEL
XGROUP
XINFO
XLEN
XPENDING
XRANGE
XTRIM
XREVRANGE
XREAD
XREADGROUP GROUP
Table 13-72 Redis commands restricted for read/write splitting DCS Redis 4.0
instances
Category Command Restriction
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 883
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-73 Redis commands restricted for Proxy Cluster DCS Redis 5.0 instances
Category Command Restriction
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 884
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 885
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 886
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 887
Huawei Cloud Stack
Solution Description 13 Application Services
XCLAIM
XDEL
XGROUP
XINFO
XLEN
XPENDING
XRANGE
XTRIM
XREVRANGE
XREAD
XREADGROUP GROUP
Table 13-74 Redis commands restricted for read/write splitting DCS Redis 5.0
instances
Category Command Restriction
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 888
Huawei Cloud Stack
Solution Description 13 Application Services
XREADGROUP GROUP
KEYS Command
In case of a large amount of cached data, running the KEYS command may block
the execution of other commands for a long time or occupy exceptionally large
memory. Therefore, when running the KEYS command, describe the exact pattern
and do not use fuzzy keys *. Do not use the KEYS command in the production
environment. Otherwise, the service running will be affected.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 889
Huawei Cloud Stack
Solution Description 13 Application Services
Other Restrictions
● The time limit for executing a Redis command is 15 seconds. To prevent other
services from failing, a master/replica switchover will be triggered after the
command execution times out.
To meet the reliability requirements of your data and services, you can choose to
deploy your DCS instance within a single AZ or across AZs.
Single-AZ HA
Single-AZ deployment means to deploy an instance within a physical equipment
room. DCS provides process/service HA, data persistence, and hot standby DR
policies for different types of DCS instances.
Single-node DCS instance: When DCS detects a process fault, a new process is
started to ensure service HA.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 890
Huawei Cloud Stack
Solution Description 13 Application Services
Master/Standby DCS instance: Data is persisted to disk in the master node and
incrementally synchronized and persisted to the standby node, achieving hot
standby and data persistence.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 891
Huawei Cloud Stack
Solution Description 13 Application Services
Cross-AZ DR
The master and standby nodes of a master/standby, read/write splitting, DCS
instance can be deployed across AZs (in different equipment rooms). Power
supplies and networks of different AZs are physically isolated. When a fault occurs
in the AZ where the master node is deployed, the standby node connects to the
client and takes over data read and write operations.
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 892
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
● You can deploy your application across AZs to ensure both data reliability and service
availability in the event of power supply or network disruptions.
● Cross-AZ instances do not support password changes, command renaming, and
specification modification when an AZ is faulty.
● Cross-AZ HA instances must be created in the DR AZ. Only dual-AZ DR is supported.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 893
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
The underlying architectures vary by Redis version. Once a Redis version is chosen, it
cannot be changed. For example, you cannot upgrade a DCS Redis 3.0 instance to
Redis 4.0 or 5.0. If you require a higher Redis version, create a new instance that meets
your requirements and then migrate data from the old instance to the new one.
DCS Redis 3.0 instances have been taken offline at new sites, but can still be used at
existing sites. DCS Redis 4.0 or 5.0 instances are recommended.
● Instance type
Select from single-node, master/standby, read/write splitting, and cluster
types. For details about their architectures and application scenarios, see
13.3.3 DCS Instance Types.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 894
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-76 Differences between DCS for Redis and open-source Redis
Feature Open-Source DCS for Redis
Redis
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 895
Huawei Cloud Stack
Solution Description 13 Application Services
Resource Space
Resource spaces are used to group and isolate OpenStack resources (computing
resources, storage resources, and network resources). A resource space can be a
department or a resource space team. Multiple resource spaces can be created for
one account.
Password-Free Access
DCS Redis instances can be accessed in the VPC without passwords. Latency is
lower because no password authentication is involved.
You can enable password-free access for instances that do not have sensitive data.
Cross-AZ Deployment
Master/Standby instances are deployed across different AZs with physically
isolated power supplies and networks. Applications can also be deployed across
AZs to achieve HA for both data and applications.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 896
Huawei Cloud Stack
Solution Description 13 Application Services
When creating a master/standby DCS Redis instance, you can select a standby AZ
for the standby node.
Shard
A shard is a management unit of a cluster DCS Redis instance. Each shard
corresponds to a redis-server process. A cluster consists of multiple shards. Each
shard has multiple slots. Data is distributedly stored in the slots. The use of shards
increases cache capacity and concurrent connections.
Each cluster instance consists of multiple shards. By default, each shard is a
master/standby instance with two replicas. The number of shards is equal to the
number of master nodes in a cluster instance.
Replica
A replica is a node in a DCS instance. A single-replica instance has no standby
node. A two-replica instance has one master node and one standby node. By
default, each master/standby instance has two replicas. If the number of replicas
is set to three for a master/standby instance, the instance has one master node
and two standby nodes. A single-node instance has only one node.
13.3.10 Permissions
If you need to assign different permissions to employees in your enterprise to
access your DCS resources, Identity and Access Management (IAM) is a good
choice for fine-grained permissions management. IAM provides identity
authentication, permissions management, and access control, helping you secure
access to your resources.
With IAM, you can use your account to create IAM users, and assign permissions
to the users to control their access to specific resources. For example, some
software developers in your enterprise need to use DCS resources but should not
be allowed to delete DCS instances or perform any other high-risk operations. In
this scenario, you can create IAM users for the software developers and grant
them only the permissions required for using DCS resources.
If your account does not require individual IAM users for permissions
management, skip this section.
DCS Permissions
By default, new IAM users do not have permissions assigned. You need to add a
user to one or more groups, and attach permissions policies or roles to these
groups. Users inherit permissions from the groups to which they are added and
can perform specified operations on cloud services based on the permissions.
DCS is a project-level service deployed and accessed in specific physical regions. To
assign DCS permissions to a user group, specify the scope as region-specific
projects and select regions for the permissions to take effect. If All projects is
selected, the permissions will take effect for the user group in all region-specific
projects. When accessing DCS, the users need to switch to a region where they
have been authorized to use this service.
You can grant users permissions by using roles and policies.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 897
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 898
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
The DCS UserAccess policy is different from the DCS FullAccess policy. If you configure
both of them, you cannot create, modify, delete, or scale DCS instances because deny
statements will take precedence over allowed statements.
Table 13-78 lists the common operations supported by system-defined policies for
DCS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 899
Huawei Cloud Stack
Solution Description 13 Application Services
Modifying √ √ ×
instance
configuration
parameters
Deleting √ √ ×
background
tasks
Accessing √ √ ×
instances
using Web CLI
Modifying √ √ ×
instance
running status
Expanding √ × ×
instance
capacity
Changing √ √ ×
instance
passwords
Modifying √ × ×
DCS instances
Performing a √ √ ×
master/
standby
switchover
Backing up √ √ ×
instance data
Creating DCS √ × ×
instances
Deleting √ √ ×
instance
backup files
Restoring √ √ ×
instance data
Resetting √ √ ×
instance
passwords
Migrating √ √ ×
instance data
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 900
Huawei Cloud Stack
Solution Description 13 Application Services
Downloading √ √ ×
instance
backup data
Deleting DCS √ × ×
instances
Querying √ √ √
instance
configuration
parameters
Querying √ √ √
instance
restoration
logs
Querying √ √ √
instance
backup logs
Querying DCS √ √ √
instances
Querying √ √ √
instance
background
tasks
Querying all √ √ √
instances
Viewing √ √ √
instance
performance
metrics
Modifying √ √ ×
parameters in
a parameter
template
Deleting a √ √ ×
parameter
template
Creating a √ √ ×
parameter
template
Parameter √ √ √
template list
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 901
Huawei Cloud Stack
Solution Description 13 Application Services
Querying a √ √ √
parameter
template
● Cloud O&M has high requirements on personnel skills. O&M tools are hard to
configure. Multiple systems need to be maintained at the same time.
Distributed tracing systems face high learning and usage costs, but have poor
stability.
● Distributed applications face analysis difficulties such as how to visualize the
dependency between microservices, improve user experience, associate
scattered logs for analysis, and quickly trace problems.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 902
Huawei Cloud Stack
Solution Description 13 Application Services
Introduction to AOM
Advantages
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 903
Huawei Cloud Stack
Solution Description 13 Application Services
● Open ecosystem
O&M data query APIs are opened, collection standards are provided, and
independent development is supported.
Architecture Description
● Data collection and access layer
– Collecting data by using ICAgent
You can install the ICAgent (a plug-in data collector) on a host and use it
to report O&M data.
– Connecting data by using APIs
You can connect service metrics to AOM as custom metrics using AOM
open APIs or Exporter APIs.
● Transmission and storage layer
– Data transmission: AOM Access is a proxy for receiving O&M data. After
O&M data is received, such data will be placed in the Kafka queue. Kafka
then transmits the data to the service computing layer in real time based
on its high-throughput capability.
– Data storage: After being processed by the AOM backend, O&M data is
written into a database. Cassandra stores sequential data, Redis is used
for cache query, etcd stores AOM configuration data, and Elasticsearch
stores resources, logs, alarms, and events.
● Service computing layer
AOM provides basic O&M services such as alarm management, log
management, and resource monitoring (such as metric monitoring).
13.4.3 Functions
Application Monitoring
Application monitoring allows you to view application resource usage, trends, and
alarms in real time, so that you can make fast responses to ensure smooth
running for applications.
This function adopts the hierarchical drill-down design. The hierarchy is as follows:
Application list > Application details > Component details > Instance details >
Process details. Applications, components, instances, and processes are visually
associated with each other on the console.
Host Monitoring
Host monitoring allows you to view host resource usage, trends, and alarms in
real time, so that you can make fast responses and ensure smooth running for
hosts.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 904
Huawei Cloud Stack
Solution Description 13 Application Services
Like application monitoring, this function also adopts the hierarchical drill-down
design. The hierarchy is as follows: Host list > Host details. The details page
contains all the instances, GPUs, NICs, disks, and file systems of the current host.
Dashboard
With a dashboard, different graphs can be displayed on the same screen. Various
graphs, such as line graphs, digit graphs, and top N resource graphs enable you to
monitor data comprehensively.
For example, you can add key metrics to a dashboard for real-time monitoring.
You can also compare the same metric of different resources on one screen. In
addition, by adding common O&M metrics to a dashboard, you do not need to
reselect them when re-opening the AOM console during routine O&M.
Alarm Management
The alarm list helps you manage alarms and events.
You can create alarm rules for key resource metrics. When the metric value
reaches the threshold, AOM will generate alarms. An event alarm will be
generated if the resource data meets an event condition. A threshold-crossing
alarm will be generated if the metric data meets a threshold condition. An
insufficient data event will be generated if no metric data is reported. Therefore,
you can discover and handle exceptions at the earliest time. When an alarm is
reported, alarm information will be sent to specified personnel by email or SMS
based on alarm action rules. Therefore, O&M personnel can rectify faults in time
to avoid service loss.
Log Management
AOM provides powerful log management capabilities. Log search enables you to
quickly search for required logs from massive quantities of logs. Log dump enables
you to store logs for a long period. By configuring delimiters, you can divide log
content into multiple words and use these words to search for logs.
Metric Browsing
The Metric Browsing page displays metric data of each resource. You can monitor
metric values and trends in real time, and create alarm rules for desired metrics. In
this way, you can monitor services in real time and perform data correlation
analysis.
Prometheus Monitoring
AOM is fully interconnected with the open-source Prometheus ecosystem. It
monitors many types of components, provides multiple ready-to-use dashboards,
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 905
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 906
Huawei Cloud Stack
Solution Description 13 Application Services
Multi-Dimensional O&M
You need to monitor comprehensive system running status and make fast
response to various problems.
AOM provides multi-dimensional O&M capabilities from the cloud level to the
resource level and from application monitoring to microservice tracing.
Advantages
● User experience assurance: Service health status KPIs in real time are
monitored in real time and root causes of exceptions are analyzed.
● Fast fault diagnosis: Distributed call tracing enables you to locate faults
quickly.
● Resource running assurance: Hundreds of O&M metrics about resources such
as containers, disks, and networks are monitored in real time, and clusters,
VMs, applications, and containers are associated for analysis.
13.4.5.1 Introduction
Metrics reflect resource performance data or status. A metric consists of a
namespace, dimension, name, and unit. Metrics can be divided into:
● System metrics: basic metrics provided by AOM, such as CPU usage and used
CPU cores.
● Custom metrics: user-defined metrics. Custom metrics can be reported using
the following methods:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 907
Huawei Cloud Stack
Solution Description 13 Application Services
– Method 1: Use AOM APIs. For details, see "Adding Monitoring Data" and
"Querying Monitoring Data" in Application Operations Management
(AOM) API Reference (for Huawei Cloud Stack 8.3.0).
– Method 2: When creating containerized applications on CCE, interconnect
with Prometheus to report custom metrics. For details, see "Custom
Monitoring" in Cloud Container Engine (CCE) User Guide (for Huawei
Cloud Stack 8.3.0).
Metric Namespaces
A namespace is an abstract collection of resources and objects. Metrics in different
namespaces are independent of each other so that metrics of different
applications will not be aggregated to the same statistics information.
● Namespaces of system metrics are fixed and started with PAAS.. For details,
see Table 13-79.
Namespace Description
Metric Dimensions
Metric dimensions indicate the categories of metrics. Each metric has certain
features, and a dimension may be considered as a category of such features.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 908
Huawei Cloud Stack
Solution Description 13 Application Services
clusterId Cluster ID
hostID Host ID
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 909
Huawei Cloud Stack
Solution Description 13 Application Services
Disk read rate Volume of data read from a disk per ≥0 KB/s
(aom_node_disk_read_ second
kilobytes)
Dimension Description
clusterId Cluster ID
hostID Host ID
● If the host type is CCE, you can view disk partition metrics. The supported OSs are
CentOS 7.6 and EulerOS 2.5.
● Log in to the CCE node as the root user and run the docker info | grep 'Storage Driver'
command to check the Docker storage driver type. If the command output shows driver
type Device Mapper, the thin pool metrics can be viewed. Otherwise, the thin pool
metrics cannot be viewed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 910
Huawei Cloud Stack
Solution Description 13 Application Services
Available disk space Disk space that has not been used ≥0 MB
(aom_node_disk_avail
able_capacity_megaby
tes)
Dimension Description
clusterId Cluster ID
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 911
Huawei Cloud Stack
Solution Description 13 Application Services
Dimension Description
hostID Host ID
Total CPU cores Total number of CPU cores that have ≥1 Cores
(aom_node_cpu_limit_ been applied for a measured object
core)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 912
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 913
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 914
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
● AOM can collect NPU metrics (total storage space, storage usage, used storage space,
NPU usage, and temperature) of Ascend Snt9 and D710 hosts only.
● Memory usage = (Physical memory capacity – Available physical memory capacity)/
Physical memory capacity; Virtual memory usage = ((Physical memory capacity + Total
virtual memory capacity) – (Available physical memory capacity + Available virtual
memory capacity))/(Physical memory capacity + Total virtual memory capacity)
● The virtual memory of a VM is 0 MB by default. If no virtual memory is configured, the
memory usage on the monitoring page is the same as the virtual memory usage.
● For the total and used physical disk space, only the space of the local disk partitions' file
systems is counted. The file systems (such as JuiceFS, NFS, and SMB) mounted to the
host through the network are not taken into account.
clusterId Cluster ID
gpuID GPU ID
npuID NPU ID
hostID Host ID
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 915
Huawei Cloud Stack
Solution Description 13 Application Services
Dimension Description
Cluster metrics are aggregated by AOM based on host metrics, and do not include the
metrics of master nodes.
Total CPU cores Total number of CPU cores that have ≥1 Cores
(aom_cluster_cpu_limi been applied for a measured object
t_core)
Available disk space Disk space that has not been used ≥0 MB
(aom_cluster_disk_ava
ilable_capacity_megab
ytes)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 916
Huawei Cloud Stack
Solution Description 13 Application Services
clusterId Cluster ID
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 917
Huawei Cloud Stack
Solution Description 13 Application Services
Dimension Description
Disk read rate Volume of data read from a disk per ≥0 KB/s
(aom_container_disk_r second
ead_kilobytes)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 918
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 919
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 920
Huawei Cloud Stack
Solution Description 13 Application Services
appID Service ID
clusterId Cluster ID
containerID Container ID
podID Instance ID
serviceID Inventory ID
gpuID GPU ID
npuID NPU ID
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 921
Huawei Cloud Stack
Solution Description 13 Application Services
Total CPU cores Total number of CPU cores that have ≥1 Cores
(aom_process_cpu_lim been applied for a measured object
it_core)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 922
Huawei Cloud Stack
Solution Description 13 Application Services
clusterId Cluster ID
processID Process ID
serviceID Inventory ID
aomApplicationID Application ID
13.4.6 Restrictions
OS Usage Restrictions
AOM supports multiple operating systems (OSs). When creating a host, ensure
that its OS meets the requirements in Table 13-95. Otherwise, the host cannot be
monitored by AOM.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 923
Huawei Cloud Stack
Solution Description 13 Application Services
openSUS 13.2 64- 42.2 64- 15.0 64-bit (Currently, syslog logs cannot be
E bit bit collected.)
EulerOS 2.2 64-bit 2.3 64-bit 2.5 64-bit 2.9 64bit 2.10 64bit
CentOS 6.3 64-bit 6.5 64-bit 6.8 64-bit 6.9 64-bit 6.10 64-bit
7.1 64-bit 7.2 64-bit 7.3 64-bit 7.4 64-bit 7.5 64-bit 7.6 64-bit
Debian 7.5.0 32- 7.5.0 64- 8.2.0 64- 8.8.0 64- 9.0.0 64-bit
bit bit bit bit
NOTE
● For Linux x86_64 servers, AOM supports all the OSs and versions listed in the preceding
table.
● For Linux Arm servers, AOM only supports CentOS 7.4 and later versions, and other OSs
and versions listed in the preceding table.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 924
Huawei Cloud Stack
Solution Description 13 Application Services
Metric Metric data Metric data can be stored in the database for
up to 30 days.
Custom Unlimited.
metric
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 925
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 926
Huawei Cloud Stack
Solution Description 13 Application Services
Alarm Alarm You can query the alarms generated in the last
31 days.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 927
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 928
Huawei Cloud Stack
Solution Description 13 Application Services
the personnel.
cap AOM supports
aci a maximum of
ty 30 million
or alarms.
red
Maxi Unlimit Unlimit Unlimite 6 million 6 uce When the
mum ed ed d mill the number of
numb ion nu alarms exceeds
er of mb 6 million for a
alarms er single account,
for a of the query
single cus performance
accou to deteriorates. If
nt m the number of
me alarms is
tric expected to
s. exceed 6
million within
30 days, report
alarms using
different
accounts.
Collector Deployment
When you manually install the ICAgent on an Elastic Cloud Server (ECS), your
AK/SK will be used as an input parameter in the installation command. To prevent
privacy leakage, disable historical record collection before installing the ICAgent.
After the ICAgent is installed, it will encrypt and store your AK/SK.
Container Monitoring
For Cloud Container Engine (CCE) container monitoring, the AOM collector
(ICAgent) must run as a privileged container. Evaluate the security risks of the
privileged container and identify your container service scenarios. For example, for
a node that provides services through logical multi-tenant container sharing, use
open-source tools such as Prometheus to monitor the services and do not use
ICAgent.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 929
Huawei Cloud Stack
Solution Description 13 Application Services
SMN
SMN can push notifications by SMS message, email, or app based on your
requirements. You can integrate application functions through SMN to reduce
system complexity.
AOM uses the message transmission mechanism of SMN. When it is inconvenient
for you to query threshold rule status changes on site, AOM sends such changes
to you by email or SMS messages. In this way, you can obtain resource status and
other information in real time and take necessary measures to avoid service loss.
OBS
Object Storage Service (OBS) is a secure, reliable, and cost-effective cloud storage
service. With OBS, you can easily create, modify, and delete buckets, as well as
upload, download, and delete objects.
AOM allows you to dump logs to OBS buckets for long-term storage.
IAM
Identity and Access Management (IAM) provides identity authentication,
permission management, and access control.
IAM can implement authentication and fine-grained authorization for AOM.
APM
APM monitors and manages the performance of cloud applications in real time. It
provides performance analysis of distributed applications, helping O&M personnel
quickly locate and resolve faults and performance bottlenecks.
AOM integrates APM functions to better monitor and manage applications.
VPC
VPC is a logically isolated virtual network. It is created for ECSs, and supports
custom configuration and management, improving resource security and
simplifying network deployment.
ELB
ELB distributes access traffic to multiple backend ECSs based on forwarding
policies. By distributing traffic, ELB expands the capabilities of application systems
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 930
Huawei Cloud Stack
Solution Description 13 Application Services
RDS
Relational Database Service (RDS) is a cloud-based web service that is reliable,
scalable, and easy to manage.
DCS
DCS is an online, distributed, in-memory cache service compatible with Redis,
Memcached, and In-Memory Data Grid (IMDG). It is reliable, scalable, ready to
use out-of-the-box, and easy to manage, meeting your requirements for high
read/write performance and fast data access.
CCE
CCE is a high-performance and scalable container service through which
enterprises can build reliable containerized applications. It integrates network and
storage capabilities, and is compatible with Kubernetes and Docker container
ecosystems. CCE enables you to create and manage diverse containerized
workloads easily. It also provides efficient O&M capabilities, such as container
fault self-healing, monitoring log collection, and auto scaling.
You can monitor basic resources, applications, logs, and alarms about CCE on the
AOM console.
ServiceStage
ServiceStage is a one-stop PaaS platform service for enterprises. It hosts
applications of enterprises on the cloud to simplify application lifecycle
management, covering deployment, monitoring, O&M, and governance. In
addition, ServiceStage provides a microservice framework compatible with
mainstream open-source ecosystems and decoupled from specific development
frameworks and platforms, helping enterprises quickly build distributed
applications based on microservice architectures.
You can monitor basic resources, applications, logs, and alarms about ServiceStage
on the AOM console.
ECS
ECS is a computing server consisting of the CPU, memory, image, and Elastic
Volume Service (EVS) disk. It supports on-demand allocation and auto scaling.
ECSs integrate VPC, virtual firewall, and multi-data-copy capabilities to create an
efficient, reliable, and secure computing environment. This ensures stable and
uninterrupted running of services. After creating an ECS server, you can use it like
using your local computer or physical server.
When purchasing an ECS, ensure that its OS meets the requirements in Table
13-95. In addition, install an ICAgent on the ECS. Otherwise, the ECS cannot be
monitored by AOM. You can monitor basic resources, applications, logs, and
alarms about this ECS on the AOM console.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 931
Huawei Cloud Stack
Solution Description 13 Application Services
BMS
Bare Metal Server (BMS) is a dedicated physical server in the cloud. It provides
high-performance computing and ensures data security for core databases, key
application systems, and big data. With the advantage of scalable cloud resources,
you can apply for BMS servers flexibly and they are billed on a pay-per-use basis.
When purchasing a BMS server, ensure that its OS meets the requirements in
Table 13-95. In addition, install an ICAgent on the server. Otherwise, the server
cannot be monitored by AOM. You can monitor basic resources, applications, logs,
and alarms about this server on the AOM console.
13.4.9 Glossary
Metrics
Metrics reflect resource performance data or status. A metric consists of a
namespace, dimension, name, and unit.
Hosts
Each host of AOM corresponds to a VM or physical machine. A host can be your
own VM or physical machine, or a VM (for example, an ECS) that you created. A
host can only be connected to AOM for monitoring when its OS is supported by
AOM and an ICAgent has been installed on the host.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 932
Huawei Cloud Stack
Solution Description 13 Application Services
ICAgent
ICAgent is the collector of AOM. It runs on hosts to collect metrics, logs, and
application performance data in real time. Before using AOM, ensure that the
ICAgent has been installed. Otherwise, AOM cannot be used.
Logs
AOM supports log collection, search, analysis, download, and dump. It also reports
alarms based on keyword statistics and enables you to export reports, query SQL
statements, and monitor data in real time.
Alarms
Alarms are reported when AOM or an external service such as ServiceStage,
Application Performance Management (APM), or Cloud Container Engine (CCE) is
abnormal or may cause exceptions. Alarms will cause service exceptions and need
to be handled.
Events
Events generally carry some important information. They are reported when AOM
or an external service, such as ServiceStage, APM, or CCE encounters some
changes. Such changes do not necessarily cause service exceptions. Events do not
need to be handled.
13.4.10 Permissions
AOM Permissions
Table 13-98 lists all the system permissions supported by AOM.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 933
Huawei Cloud Stack
Solution Description 13 Application Services
To use a custom fine-grained policy, log in to IAM as the administrator and select
fine-grained permissions of AOM as required. For details, see Table 13-99.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 934
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 935
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 936
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 937
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 938
Huawei Cloud Stack
Solution Description 13 Application Services
storage. Collected logs can be quickly queried by keyword or fuzzy match. You can
analyze real-time logs for security diagnosis and analysis, or obtain operations
statistics, such as cloud service visits and clicks.
Log Streams
Up to 100 streams can be created in a log group.
You can separate logs into different log streams based on log types, and name log
streams in an easily identifiable way. This helps you quickly find your desired logs.
13.5.3 Features
Real-time Log CollectionReal-time Log Collection
LTS collects real-time logs and displays them on the LTS console in an intuitive
and orderly manner. You can query logs or transfer logs for long-term storage.
Collected logs can be structured for analysis. To be specific, LTS extracts logs that
are in a fixed format or share a similar pattern based on the extraction rules you
set. Then you can use SQL syntax to query the structured logs.
You can view real-time logs to keep track of the status of the services connected
to LTS. You can also pre-view logs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 939
Huawei Cloud Stack
Solution Description 13 Application Services
Log Transfer
You can customize the retention period of logs reported from ECS and cloud
services to LTS. Logs older than the retention period will be automatically deleted.
For long-term storage, you can transfer logs to Object Storage Service (OBS). Log
transfer is to replicate logs to the target cloud service. It means that, after log
transfer, the original logs will still be retained in LTS until the configured retention
period ends.
Reported logs are retained in LTS for 7 days by default. Retained logs are deleted
once the period is over. For long-term storage, you can transfer logs to Object
Storage Service (OBS) buckets.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 940
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 941
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 942
Huawei Cloud Stack
Solution Description 13 Application Services
Log Number The total number of new logs in all log N/A
group of new groups cannot exceed the limit set in a
logs per complete LTS.
day
Peak log The total number of new logs in all log N/A
rate groups cannot exceed the limit set in a
complete LTS.
Log writes The total number of new logs in all log N/A
groups cannot exceed the limit set in a
complete LTS.
Log reads The total number of new logs in all log N/A
groups cannot exceed the limit set in a
complete LTS.
Log Number The total number of new logs in all log N/A
stream of new streams cannot exceed the limit set in
logs per a complete LTS.
day
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 943
Huawei Cloud Stack
Solution Description 13 Application Services
Peak log The total number of new logs in all log N/A
rate streams cannot exceed the limit set in
a complete LTS.
Log writes The total number of new logs in all log N/A
streams cannot exceed the limit set in
a complete LTS.
Log reads The total number of new logs in all log N/A
streams cannot exceed the limit set in
a complete LTS.
13.5.5.3 ICAgent
This section describes the restrictions on the log collector ICAgent.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 944
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 945
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 946
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 947
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 948
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 949
Huawei Cloud Stack
Solution Description 13 Application Services
Search
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 950
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-106
Categ Item Description Remarks
ory
Log Transfer tasks for A log stream can have only N/A
transfe a log stream one task for transferring logs
r to to OBS.
OBS
Log transfer 2 minutes, 5 minutes, 30 N/A
interval minutes, 1 hour, 3 hours, 6
hours, 12 hours
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 951
Huawei Cloud Stack
Solution Description 13 Application Services
Operatin Version
g
Systems
CentOS 6.3 64bit 6.5 64bit 6.8 64bit 6.9 64bit 6.10 64bit
7.1 64bit 7.2 64bit 7.3 64bit 7.4 64bit 7.5 64bit 7.6 64bit
7.7 64bit 7.8 64bit 7.9 64bit 8.0 64bit 8.1 64bit 8.2 64bit
NOTE
● For Linux x86_64 hosts, LTS supports all the OSs and versions listed in the preceding
table.
● For Linux Arm hosts, LTS supports all the OSs and versions listed in the preceding table
except the CentOS of 7.3 and earlier versions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 952
Huawei Cloud Stack
Solution Description 13 Application Services
Log reads Logs can be read up to 100 times per To increase the
minute in an account. upper limit,
contact
technical
support
engineers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 953
Huawei Cloud Stack
Solution Description 13 Application Services
Description
If you need to assign different permissions to employees in your enterprise to
access your LTS resources, is a good choice for fine-grained permissions
management. IAM provides identity authentication, permissions management,
and access control, helping you secure access to your LTS resources.
With IAM, you can use your account to create IAM users for your employees, and
assign permissions to the users to control their access to LTS resources. For
example, some software developers in your enterprise need to use LTS resources
but should not delete them or perform other high-risk operations. In this case, you
can create IAM users for the software developers and grant them only the
permissions required.
If your account does not need individual IAM users for permissions management,
you may skip over this section.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 954
Huawei Cloud Stack
Solution Description 13 Application Services
IAM can be used for free. You pay only for the resources in your account. For more
information about IAM, see .
LTS Permissions
By default, new IAM users do not have permissions assigned. You need to add
users to one or more groups, and attach permissions policies or roles to these
groups. Users inherit permissions from the groups to which they are added and
can perform specified operations on cloud services based on the permissions.
LTS is a project-level service deployed and accessed in specific physical regions. To
assign LTS permissions to a user group, specify the scope as region-specific
projects and select projects for the permissions to take effect. If All projects is
selected, the permissions will take effect for the user group in all region-specific
projects. When accessing LTS, the users need to switch to a region where they
have been authorized to use LTS.
Policies: A type of fine-grained authorization mechanism that defines permissions
required to perform operations on specific cloud resources under certain
conditions. This mechanism allows for more flexible policy-based authorization,
meeting requirements for secure access control. For example, you can grant Elastic
Cloud Server (ECS) users only the permissions for managing a certain type of
ECSs. Most policies define permissions based on APIs.
The system permissions supported by LTS are listed in Table 13-109.
LTS Full permissions for LTS. Users with System CCE Administrator, OBS
FullAccess these permissions can perform - Administrator, and AOM FullAccess
operations on LTS. define
d
policy
LTS Administrator permissions for LTS. System This role is dependent on the
Administrat - Tenant Guest and Tenant
or define Administrator roles.
d role
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 955
Huawei Cloud Stack
Solution Description 13 Application Services
Table 13-110 Common operations supported by each LTS system policy or role
Querying a log √ √ √
group
Creating a log √ × √
group
Modifying a log √ × √
group
Deleting a log √ × √
group
Querying a log √ √ √
stream
Creating a log √ × √
stream
Modifying a log √ × √
stream
Deleting a log √ × √
stream
Configuring log √ × √
collection from
hosts
Querying the √ √ √
configuration of
log structuring
Configuring log √ × √
structuring
Enabling quick √ × √
analysis
Disabling quick √ × √
analysis
Querying a filter √ √ √
Disabling a filter √ × √
Enabling a filter √ × √
Deleting a filter √ × √
Viewing a log √ √ √
transfer task
Creating a log √ × √
transfer task
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 956
Huawei Cloud Stack
Solution Description 13 Application Services
Modifying a log √ × √
transfer task
Deleting a log √ × √
transfer task
Enabling a log √ × √
transfer task
Disabling a log √ × √
transfer task
Installing ICAgent √ × √
Upgrading √ × √
ICAgent
Uninstalling √ × √
ICAgent
To use a custom fine-grained policy, log in to IAM as the administrator and select
fine-grained permissions of LTS as required.
Table 13-111 describes fine-grained permission dependencies of LTS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 957
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 958
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 959
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 960
Huawei Cloud Stack
Solution Description 13 Application Services
13.5.9 Glossary
This section describes common terms used in LTS to help you better understand
and use LTS.
LTS Log Tank LTS collects, analyzes, and stores logs. You can use
Service LTS for efficient device O&M, service trend
analysis, security audits, and monitoring.
- Log stream A log stream is the basic unit for log reads and
writes. If there are many logs to collect, you are
advised to separate logs into different log streams
based on log types, and name log streams in an
easily identifiable way.
O&M Challenges
In the cloud era, more and more applications are deployed in the distributed
microservice architecture. The number of users also increases explosively, facing
various application exceptions. In traditional O&M mode, metrics of multiple O&M
systems cannot be associated for analysis. O&M personnel need to check
application exceptions one by one based on experience, resulting in low efficiency,
costly maintenance, and poor stability.
When there are massive quantities of services, O&M personnel face the following
challenges:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 961
Huawei Cloud Stack
Solution Description 13 Application Services
Introduction to APM
Application Performance Management (APM) monitors and manages the
performance of cloud applications in real time. APM analyzes the performance of
distributed applications, helping O&M personnel quickly locate and resolve faults
and performance bottlenecks.
APM is a cloud application diagnosis service and has powerful analysis tools. It
displays the application status, call processes, and user operations through metric
monitoring, topologies, and tracing.
Monitoring Description
Capability
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 962
Huawei Cloud Stack
Solution Description 13 Application Services
Monitoring Description
Capability
Metric drill-down APM enables you to drill down and analyze metrics such as
analysis application response time, number of requests, and error
rate, and view metrics by application, component,
environment, database, middleware, or other dimensions.
Product Advantages
JavaAgents are developed to collect application call data, service inventory data,
and call KPI data.
Opens O&M data query APIs and collection standards, and supports independent
development.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 963
Huawei Cloud Stack
Solution Description 13 Application Services
13.6.2 Functions
APM is a cloud application diagnosis service that monitors metrics, displays
topologies, and supports tracing.
Monitoring Metrics
Each monitoring item has different metric sets, and each metric set contains
multiple metrics. APM supports the following monitoring items:
● JVMInfo
● JVM
● GC
● JavaMethod
● MySQL
● URL
● CSEProvider
● DubboProvider
● ApacheHttpClient
● HttpClient
● CSEConsumer
● DubboConsumer
● Jedis
● Lettuce
● Redis
● Tomcat
● Exception
● FunctionGraph
● KafkaConsumer
● KafkaProducer
Full-Link Topology
● Visible topology: APM displays application call and dependency relationships
in topologies. Application Performance Index (Apdex) is used to quantify user
satisfaction with application performance. Different colors indicate different
response time ranges, helping you quickly detect and locate performance
problems. Figure 13-35 shows the application relationships, call data (service
and instance metrics), and health status.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 964
Huawei Cloud Stack
Solution Description 13 Application Services
Tracing
APM comprehensively monitors application calls, and displays service execution
traces and statuses, helping you quickly demarcate performance bottlenecks and
faults.
● In the displayed trace list, click the target trace to view its basic information.
● On the trace details page, you can view the trace's complete information,
including the local method stack and remote call relationships.
Full-Link Monitoring
Pain Points
If application performance problems cannot be reproduced, it is difficult to quickly
detect performance bottlenecks and locate causes. For example, when a user
reports slow page loading, it may be caused by the network, resource loading, or
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 965
Huawei Cloud Stack
Solution Description 13 Application Services
application problem. When a user reports frame freezing, it may be caused by the
faulty network between the user device and the server, or the overloaded server or
database. Even if you can locate the problem, it is also difficult to quickly locate
root causes in code.
Service Implementation
APM provides the full-link monitoring capability. You can view the latency and
throughput between applications in the topology to monitor application running
in real time and quickly diagnose faults.
● No code modification: Based on non-intrusive tracking, APM allows you to run
commands to trace applications and obtain their performance data.
● Full-link tracing: After detecting abnormal applications on the topology, you
can reproduce problems using distributed tracing to quickly locate
performance bottlenecks in code.
Application Breakdown
Pain Points
With the distributed microservice architecture, enterprises can develop diverse
complex applications efficiently. However, this architecture poses great challenges
to traditional O&M and diagnosis technologies. For example, an e-commerce
application may face the following problems:
● Difficult fault locating
After receiving customers' feedback, customer service personnel submit
problems to technical personnel for troubleshooting. In the distributed
microservice architecture, a request usually undergoes multiple services or
nodes before being responded. If a fault occurs, O&M personnel have to
repeatedly view logs on multiple hosts to locate the fault. Even a simple
problem can involve multiple teams.
● Complex architecture
When service logic becomes complex, it is difficult to find out the dependent
downstream services (databases, HTTP APIs, and caches) of an application,
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 966
Huawei Cloud Stack
Solution Description 13 Application Services
and external services that depend on the application from the perspective of
code. It is also difficult to sort out the service logic, manage the architecture,
and plan capacities. For example, enterprises find it hard to determine the
number of hosts required for online promotions.
Service Implementation
APM can diagnose exceptions in large distributed applications. When an
application breaks down or a request fails, you can locate faults in minutes
through topologies and drill-downs.
● Visible topology: Abnormal application instances can be automatically
discovered on the topology.
● Slow SQL analysis: APM displays graphs of key metrics (such as the number
of SQL statement calls, latency, and number of errors), and provides analysis
of database performance problems caused by abnormal SQL statements.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 967
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 968
Huawei Cloud Stack
Solution Description 13 Application Services
Tracing
By tracing and recording application calls, APM restores the execution traces and
statuses of application requests in distributed systems, so that you can quickly
locate performance bottlenecks and faults.
Application
Application (global concept): refers to a logical unit. You can view the same
application information in all regions. For example, an independent functional
module under an account can be defined as an application.
Sub-application
Sub-application (global concept): You can create multiple sub-applications under
an application. They serve like folders for management. You can create up to three
layers of sub-applications.
Component
Component (global concept): refers to a program or microservice. In cloud service
scenarios, a program can be deployed in multiple regions, and each region forms
an environment. For example, an order application can be deployed in the
function test environment, pressure test environment, pre-release environment, or
live network environment.
Environment
An application can be deployed in multiple regions, and each region forms an
environment. Each environment has its own region attribute. You can filter
environments by region. You can also add one or more tags to an environment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 969
Huawei Cloud Stack
Solution Description 13 Application Services
Instance
Instance refers to a process in an environment. It is named in the format of "host
name+IP address+instance name." An environment is usually deployed on
different hosts or containers. If an environment is deployed on one host,
differentiation by instance is supported.
Environment Tag
Environment tag is an attribute for filtering environments. Multiple environments
may have the same tag. Tags will carry public configuration capabilities in the
future. For example, the configuration set on a tag can be shared by the
environments with the same tag. Tags defined for environments of one application
are not applied to other applications.
Agent
Agents use the bytecode enhancement technology to trace calls and generate
data. The data is collected by JavaAgents and then displayed on the APM console.
If you enable the Stop Collecting Data Through Bytecode Instrumentation
option, data will no longer be collected through bytecode instrumentation, but
JVM metrics can still be collected using MBeans.
Apdex
Application Performance Index (Apdex) is an open standard developed by the
Apdex alliance to measure application performance. The Apdex standard converts
the application response time into user satisfaction with application performance
in the range of 0 to 1.
● Apdex principle
Apdex defines the threshold "T" for application response time. "T" is determined
based on performance expectations. Based on the actual response time and "T",
user experience can be categorized as follows:
Satisfied: indicates that the actual response time is shorter than or equal to "T".
For example, if "T" is 1.5s and the actual response time is 1s, user experience is
satisfied.
Tolerable: indicates that the actual response time is greater than "T", but shorter
than or equal to "4T". For example, if "T" is 1s, the tolerable upper threshold for
the response time is 4s.
Frustrated: indicates that the actual response time is greater than "4T".
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 970
Huawei Cloud Stack
Solution Description 13 Application Services
● Apdex calculation
In APM, Apdex thresholds can be customized. The application response
latency is the service latency. The Apdex value ranges from 0 to 1 and is
calculated as follows:
Apdex = (Number of satisfied samples + Number of tolerable samples x 0.5)/
Total number of samples
Apdex indicates application performance status, that is, user satisfaction with
application performance. Different colors indicate different Apdex ranges, as
shown in Table 13-115.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 971
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 972
Huawei Cloud Stack
Solution Description 13 Application Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 973
Huawei Cloud Stack
Solution Description 13 Application Services
Call query latency < 300 < 300 < 300 < 300 Latency for
(s) reporting and
displaying call
data
Hygon server call < 420 < 420 < 420 < 420 Latency for
query latency (s) reporting and
displaying Hygon
server call data
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 974
Huawei Cloud Stack
Solution Description 13 Application Services
NOTE
APM permissions are isolated by tenant. Complete calls of applications across resource sets
of a tenant can be traced. Users under the same tenant can view complete traces and
monitoring data.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 975
Huawei Cloud Stack
Solution Description 14 Database Services
14 Database Services
● MySQL
MySQL
MySQL is one of the world's most popular open-source relational databases. It
works with the Linux, Apache, and Perl/PHP/Python to establish a LAMP model for
efficient web solutions. RDS for MySQL is reliable, secure, scalable, inexpensive,
and easy to manage.
For details about the versions supported by RDS for MySQL, see 14.1.5.3 DB
Engines and Versions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 976
Huawei Cloud Stack
Solution Description 14 Database Services
DB Engines
RDS supports the following DB engines:
● MySQL
For details about the supported versions, see 14.1.5.3 DB Engines and Versions.
DB Instance Types
RDS DB instances are classified into the following types: single and primary/
standby.
For details about DB instance types, see 14.1.4.1 DB Instance Introduction and
14.1.4.2 Function Comparison.
DB Instance Classes
The DB instance class determines the compute (vCPUs) and memory capacity
(memory size) of a DB instance. For details, see 14.1.6.1 Overview.
Automated Backups
When you create a DB instance, an automated backup policy is enabled by
default. After the DB instance is created, you can modify the policy. RDS will
automatically create full backups for DB instances based on your settings.
Manual Backups
Manual backups are user-initiated full backups of DB instances. They are retained
until you delete them manually.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 977
Huawei Cloud Stack
Solution Description 14 Database Services
Projects
Projects are used to group and isolate OpenStack resources (compute, storage,
and network resources). A project can be a department or a project team. Multiple
projects can be created for a single account.
14.1.3 Advantages
Quick Setup
You can create a DB instance on the management console within minutes and
access RDS from an ECS to reduce the application response time and avoid paying
for the traffic that would be generated by regular public access.
Elastic Scaling
Performance monitoring monitors changes in the load on your database and
storage capacity. You can flexibly scale resources accordingly and pay for only
what you use.
High Compatibility
You use RDS database engines (DB engines) the same way as you would use a
native engine. RDS is compatible with existing programs and tools.
Easy O&M
Routine RDS maintenance and management operations, including hardware and
software fault handling and database patching, are easy to perform. With a web-
based console, you can reboot DB instances, reset passwords, modify parameters,
view error or slow query logs, and restore data. Additionally, the system helps you
monitor DB instances in real time and generates alarms if errors occur. You can
check DB instance information at any time, including CPU usage, IOPS, database
connections, and storage space usage.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 978
Huawei Cloud Stack
Solution Description 14 Database Services
Network Isolation
RDS uses Virtual Private Cloud (VPC) and network security groups to isolate and
secure your DB instances. VPCs allow you to define what IP address range can
access RDS. You can configure subnets and security groups to control access to DB
instances.
Access Control
RDS controls access through the domain/IAM user and security groups. When you
create an RDS DB instance, a domain is automatically created. To separate out
specific permissions, you can create IAM users and assign permissions to them as
needed. VPC security groups have rules that govern both inbound and outbound
traffic for DB instances.
Transmission Encryption
RDS uses Transport Layer Security (TLS) and Secure Sockets Layer (SSL) to encrypt
transmission. You can download a Certificate Agency (CA) certificate from the RDS
console and upload it when connecting to a database for authentication.
Storage Encryption
RDS encrypts data before storing it.
Data Deletion
When you delete an RDS DB instance, its attached disks, storage space its
automated backups occupy, and all data it stores will be deleted. You can restore a
deleted DB instance using a manual backup.
Security Protection
RDS is protected by multiple layers of firewalls to defend against various malicious
attacks, such as DDoS attacks and SQL injections. For security reasons, you are
advised to access RDS through a private network.
Data Backup
RDS automatically backs up data every day and stores backup files as packages in
Object Storage Service (OBS). The backup files can be stored for 732 days and can
be restored with just a few clicks. You can set a custom backup policy and create
manual backups at any time.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 979
Huawei Cloud Stack
Solution Description 14 Database Services
Data Restoration
You can restore data from backups to any point in time during the backup
retention period. In most scenarios, you can use backup files to restore data to a
new DB instance at any time point within 732 days. After the data is verified, data
can be migrated back to the primary DB instance.
Data Durability
RDS provides a data durability of 99.9999999%, ensuring data security and
reliability and protecting your workloads from faults.
Performance
Item Cloud Database RDS Self-Built Database Service
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 980
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 981
Huawei Cloud Stack
Solution Description 14 Database Services
Advantage Comparison
● Single DB instances: support the creation of read replicas and support the
queries of error logs and slow query logs. Different from primary/standby DB
instances that have two database nodes, a single DB instance has only one
node. If the node fails, the restoration will take a long time. Therefore, single
DB instances are not recommended for sensitive services that have high
requirements on database availability.
● Primary/Standby DB instances: use the slave database node only for failover
and restoration. The slave database node does not provide services. The
performance of single DB instances is similar to or even higher than the
primary/standby DB instances.
Number of 1 2
nodes
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 982
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 983
Huawei Cloud Stack
Solution Description 14 Database Services
DB Description Notes
Instan
ce
Type
You can use RDS to create and manage DB instances running various DB engines.
For details about differences and function comparison between different instance
types, see 14.1.4.1 DB Instance Introduction and 14.1.4.2 Function Comparison.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 984
Huawei Cloud Stack
Solution Description 14 Database Services
Ultra-high I/O Uses solid-state drives (SSDs) to store data. The maximum
throughput is 350 MB/s.
DB Instance Statuses
The status of a DB instance indicates the health of the DB instance. You can use
the management console or API to view the status of a DB instance.
Status Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 985
Huawei Cloud Stack
Solution Description 14 Database Services
Status Description
14.1.6.1 Overview
RDS for MySQL instances support both the x86 and Arm CPU architectures. For
details about the supported instance classes, see Table 14-7.
x86 4 16
4 32
8 32
8 64
16 64
16 128
32 128
60 256
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 986
Huawei Cloud Stack
Solution Description 14 Database Services
60 512
Arm 4 16
8 32
12 48
16 64
24 96
32 128
48 192
60 512
For instance specification codes and IaaS specification codes, see 14.1.11 List of
DB Instance Classes.
To offload read pressure on the primary DB instance, you can create one or more
read replicas in the same region as the primary instance. These read replicas can
process a large number of read requests and increase application throughput.
RDS Permissions
Table 14-8 lists all the system-defined roles and policies supported by RDS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 987
Huawei Cloud Stack
Solution Description 14 Database Services
NOTE
● Some RDS functions also require permissions of other services. For example, when
creating an RDS instance, you also need read-only permissions of the VPC and security
group. You can obtain such read-only permissions using the default role Tenant Guest
assigned to you.
● To perform resource-related operations, such as creating an RDS instance, changing a
single instance to a primary/standby instance, and changing the instance class, you need
the Tenant Administrator permission.
Table 14-9 lists the common operations supported by each RDS system policy.
Creating an RDS √ x
instance
Deleting an RDS √ x
instance
Table 14-10 lists common RDS operations and corresponding actions. You can
refer to this table to customize permission policies.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 988
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 989
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 990
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 991
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 992
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 993
Huawei Cloud Stack
Solution Description 14 Database Services
URL of the unified portal: https://Domain name of the ManageOne unified portal,
for example, https://console.demo.com/moserviceaccesswebsite/unifyportal#/
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 994
Huawei Cloud Stack
Solution Description 14 Database Services
Step 4 In the displayed dialog box, configure the required parameters and click OK.
● Type: Select Custom.
● User Group Name: The name consists of 1 to 64 characters and cannot start
with a digit. It can contain only letters, digits, hyphens (-), and underscores
(_), and cannot be admin, power_user, or guest.
● Description: The description can contain 0 to 255 characters.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 995
Huawei Cloud Stack
Solution Description 14 Database Services
Step 5 After the creation is complete, click Assign Permissions in the Operation column.
Step 6 On the displayed page, select the object to be authorized and click Next.
Step 7 Select the required policies (system-defined policies or user-defined policies
created in Creating a Custom Policy) and click OK.
NOTICE
----End
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 996
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 997
Huawei Cloud Stack
Solution Description 14 Database Services
Name The system provides a default policy name, for example, policy-
RDS. You can change it.
----End
14.1.9 Constraints
● If no license resource certificates are imported into the environment, you can use
resources (32 vCPUs and 1 TB of volume) for 60 days by default. When the service
resource usage exceeds the total resources authorized by the license or the license is
expired, new resources cannot be added.
● If a license resource certificate is imported into the environment, new resources are
controlled based on the time when the license was imported and the total number of
resources authorized by the license.
● For details about cloud service license control items, see "Other Information" > "Cloud
Service License Control Items" in Huawei Cloud Stack 8.3.0 License Guide.
The following tables list the constraints designed to ensure the stability and
security of RDS for MySQL.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 998
Huawei Cloud Stack
Solution Description 14 Database Services
Database root Only the root user permissions are provided on the
permissions instance creation page. For more information about
root permissions, see Table 14-13.
NOTE
Running revoke, drop user, or rename user on user root may
cause service interruption. Exercise caution when running any
of these statements.
Data migration For details, see Working with RDS for MySQL > Data
Migration > Migrating Data to RDS for MySQL Using
mysqldump in the Relational Database Service User
Guide.
RDS for MySQL Only the InnoDB storage engine is supported. MyISAM,
storage engine FEDERATED, and MEMORY are not supported.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 999
Huawei Cloud Stack
Solution Description 14 Database Services
Item Constraints
RDS backup files For details, see Working with RDS for MySQL > Data
Backups > Downloading a Full Backup File in the
Relational Database Service User Guide.
SQL standard The ZEROFILL attribute is not supported.
root Permissions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1000
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1001
Huawei Cloud Stack
Solution Description 14 Database Services
Virtual Private Isolates your networks and controls access to your RDS DB
Cloud (VPC) instances.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1002
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1003
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1004
Huawei Cloud Stack
Solution Description 14 Database Services
14.2 GaussDB
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1005
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1006
Huawei Cloud Stack
Solution Description 14 Database Services
● ETCD: The Editable Text Configuration Daemon (ETCD) is used for shared
configuration and service discovery (service registry and search).
● CMS: The Cluster Manager (CMS) manages and monitors the running status
of functional units and physical resources in a distributed system, ensuring
stable running of the entire system.
● Data node: A DN stores service data (by column, row, or hybrid store),
performs data queries, and returns execution results.
14.2.2 Scenarios
● Transaction applications
The distributed, highly scalable architecture of GaussDB makes it an ideal fit
for highly concurrent online transactions containing a large volume of data
from government, finance, e-commerce, O2O, telecom customer relationship
management (CRM), and billing. GaussDB supports different deployment
models.
● CDR query
GaussDB can process petabytes of data and use the memory analysis
technology to query massive volumes of data when data is being written to
databases. Therefore, it is suitable for the Call Detail Record (CDR) query
service in the security, telecom, finance, and Internet of things (IoT) sectors.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1007
Huawei Cloud Stack
Solution Description 14 Database Services
● High availability
Zero data loss and business recovery within minutes through cross-AZ DR
within a region
● High scalability
Online scaling, for example, adding DNs as required
● High Security
End-to-end data security by various measures, such as access control,
encryption authentication, database audit, and dynamic data masking
● Easy O&M
Effective troubleshooting by means of workload analysis report (WDR), slow
SQL diagnosis, and session diagnosis
Instances
The smallest management unit of GaussDB is the instance. A DB instance is an
isolated database environment on the cloud. You can create and manage
instances on the management console. For details about instance statuses,
instance specifications, storage types, and versions, see 14.2.6 DB Instance
Description.
Instance Versions
GaussDB 8.1.0 is supported.
Instance Types
GaussDB supports distributed and primary/standby instances. You can add nodes
for distributed instances as needed to handle large volumes of concurrent
requests. The primary/standby instances are suitable for scenarios with small and
stable volumes of data, where data reliability and service availability are extremely
important.
Instance Specifications
The instance specifications determine the computation (vCPUs) and memory
capacity (in GB) of an instance. For details, see 14.2.6.2 Instance Specifications.
Coordinator Nodes
A coordinator node (CN) receives access requests from applications and returns
execution results to clients. It also splits and distributes tasks to different data
nodes (DNs) for parallel processing.
Data Nodes
A data node (DN) stores service data, queries data, and returns execution results
to CNs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1008
Huawei Cloud Stack
Solution Description 14 Database Services
Automated Backups
When you create an instance, automated backup is enabled by default. After the
instance is created, you can modify the backup policy. GaussDB will automatically
create backups for instances based on your settings.
Manual Backups
Manual backups are user-initiated full backups of instances. They are retained
until you delete them manually.
Resource Spaces
Resource spaces are used to group and isolate underlying resources (including
compute, storage, and network resources). A resource space can be a department
or a project team. You can use an account to create multiple resource spaces.
14.2.5 Advantages
● High Security
GaussDB provides a wide range of features to let you enjoy the security of
top-level commercial databases at a low cost: dynamic data masking,
transparent data encryption (TDE), row-level access control, and encrypted
computing.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1009
Huawei Cloud Stack
Solution Description 14 Database Services
Instance Statuses
The status of a DB instance reflects the health of the instance. You can use the
management console to view the status of a DB instance.
Status Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1010
Huawei Cloud Stack
Solution Description 14 Database Services
Status Description
Storage The storage space of the instance is full. No more data can be written
full to the databases on this instance.
Deleted The instance has been deleted. Deleted instances will not be
displayed in the instance list.
Balanci The distribution of the primary and standby nodes is being balanced.
ng the
distribu
tion of
primary
and
standby
nodes
Observi The instance is in the observation period during the gray rolling
ng upgrade.
version
upgrad
e
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1011
Huawei Cloud Stack
Solution Description 14 Database Services
Backup Statuses
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1012
Huawei Cloud Stack
Solution Description 14 Database Services
16 64 ● Finance edition
(standard):
Per CN: 200
Per DN: 2,000
● Enterprise
edition:
Per CN: 350
Per DN: 1,500
● Finance edition
(data
computing):
Per CN: 500
Per DN: 500
● Primary/
Standby
instance: 2,048
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1013
Huawei Cloud Stack
Solution Description 14 Database Services
96 256 Primary/Standby
instance: 11,000
96 512 Primary/Standby
instance: 25,000
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1014
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1015
Huawei Cloud Stack
Solution Description 14 Database Services
16 64 ● Finance edition
(standard):
Per CN: 200
Per DN: 1,000
● Enterprise
edition:
Per CN: 200
Per DN: 900
● Finance edition
(data
computing):
Per CN: 500
Per DN: 500
● Primary/
Standby
instance: 2,048
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1016
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1017
Huawei Cloud Stack
Solution Description 14 Database Services
96 256 Primary/Standby
instance: 11,000
96 512 Primary/Standby
instance: 25,000
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1018
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1019
Huawei Cloud Stack
Solution Description 14 Database Services
16 64 ● Finance edition
(standard):
Per CN: 200
Per DN: 1,000
● Enterprise
edition:
Per CN: 200
Per DN: 900
● Finance edition
(data
computing):
Per CN: 500
Per DN: 500
● Primary/
Standby
instance: 2,048
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1020
Huawei Cloud Stack
Solution Description 14 Database Services
96 256 Primary/Standby
instance: 11,000
96 512 Primary/Standby
instance: 25,000
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1021
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1022
Huawei Cloud Stack
Solution Description 14 Database Services
16 64 ● Finance edition
(standard):
Per CN: 200
Per DN: 1,000
● Enterprise
edition:
Per CN: 200
Per DN: 900
● Finance edition
(data
computing):
Per CN: 500
Per DN: 500
● Primary/
Standby
instance: 2,048
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1023
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1024
Huawei Cloud Stack
Solution Description 14 Database Services
96 256 ● Primary/
Standby
instance:
11,000
96 512 ● Primary/
Standby
instance:
25,000
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1025
Huawei Cloud Stack
Solution Description 14 Database Services
4 64 Primary/Standby
NOTE instance: 100
This
specificatio
n is only
available
for primary/
standby DB
instances
that run
3.209 or
later
versions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1026
Huawei Cloud Stack
Solution Description 14 Database Services
8 32 ● Finance edition
(standard):
Per CN: 200
Per DN: 200
● Enterprise
edition:
Per CN: 200
Per DN: 200
● Primary/
Standby
instance: 100
8 64 ● Finance edition
NOTE (standard):
This Per CN: 200
specificatio
Per DN: 1,000
n is
available ● Enterprise
for only edition:
primary/ Per CN: 200
standby DB
instances Per DN: 900
that run 2.6 ● Primary/
or later
versions.
Standby
instance: 2,048
16 64 ● Finance edition
(standard):
Per CN: 200
Per DN: 1,000
● Enterprise
edition:
Per CN: 200
Per DN: 900
● Primary/
Standby
instance: 2,048
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1027
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1028
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1029
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1030
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1031
Huawei Cloud Stack
Solution Description 14 Database Services
8 64 ● Finance edition
NOTE (standard):
This Per CN: 200
specificatio
Per DN: 1,000
n is
available ● Enterprise
for only edition:
primary/ Per CN: 200
standby DB
instances Per DN: 900
that run 2.6 ● Primary/
or later
versions.
Standby
instance: 2,048
16 64 ● Finance edition
(standard):
Per CN: 200
Per DN: 1,000
● Enterprise
edition:
Per CN: 200
Per DN: 900
● Primary/
Standby
instance: 2,048
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1032
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1033
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1034
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1035
Huawei Cloud Stack
Solution Description 14 Database Services
● VDC management
permissions,
query
permissions, or
operator
permissions
● GaussDB
management
permissions
Table 14-20 lists the common operations supported by each system-defined policy
of GaussDB. Select the proper system-defined policies as required.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1036
Huawei Cloud Stack
Solution Description 14 Database Services
NOTE
● GaussDB FullAccess: administrator permissions of GaussDB. By default, this role has all
permissions to perform operations on GaussDB.
● GaussDB ReadOnlyAccess: read-only permissions for GaussDB. This role can also
perform some custom operations on GaussDB.
● To use other services, it is required to add the corresponding actions by referring to the
Remarks column in Table 14-21 and Table 14-22.
Table 14-21 lists common GaussDB operations and corresponding actions. You
can refer to this table to customize permission policies.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1037
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1038
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1039
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1040
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1041
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1042
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1043
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1044
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1045
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1046
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1047
Huawei Cloud Stack
Solution Description 14 Database Services
NOTE
● In DR scenarios, you also need to configure permissions and actions on the cloud where
the DR instance resides before performing DR-related operations.
Table 14-23 Database and user management operations and supported actions
Step 3 In the navigation pane, click User Groups. Then, click Create.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1048
Huawei Cloud Stack
Solution Description 14 Database Services
Step 4 In the displayed dialog box, configure the required parameters and click OK.
● Type: Select Custom.
● User Group Name: The name contains 1 to 64 characters and cannot start
with a digit. It can contain only letters, digits, hyphens (-), and underscores
(_), and cannot be admin, power_user, or guest.
● Description: It contains 0 to 255 characters.
Step 5 After the creation is complete, click Assign Permissions in the Operation column.
Step 6 On the displayed page, select the object to be authorized and click Next.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1049
Huawei Cloud Stack
Solution Description 14 Database Services
----End
Step 4 On the displayed page, configure related parameters and click OK.
Parameter Description
Name The system provides a default policy name, for example, policy-
GaussDB. You can change it.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1050
Huawei Cloud Stack
Solution Description 14 Database Services
----End
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1051
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1052
Huawei Cloud Stack
Solution Description 14 Database Services
A remote
service AZ
with three
replicas and
the same
number of
shards as the
primary
cluster
For details, see
DR scenario 2:
intra-city 3-
AZ and
remote 1-AZ
deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1053
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1054
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1055
Huawei Cloud Stack
Solution Description 14 Database Services
A remote
service AZ
with one
replica and the
same number
of shards as
the primary
cluster
For details, see
DR scenario 4:
intra-city 3-
AZ and
remote
Enterprise
Edition
(designed for
DR)
deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1056
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1057
Huawei Cloud Stack
Solution Description 14 Database Services
NOTICE
BMSs (enhanced gateway) are used, which depends on the EP2.0 network used by
OBS.
Intra-city HA deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1058
Huawei Cloud Stack
Solution Description 14 Database Services
auxiliary quorum. It cannot access services, and can avoid single point of failure
(SPOF). Any equipment room can achieve zero RPO and withstand network
disconnections between equipment rooms. GaussDB also supports 2-AZ, 4-replica
(one primary and three standby DNs), and 1-quorum AZ deployment solution. All
primary roles are deployed in the primary AZ by default.
● AZ1 and AZ2 have complete data, and AZ3 functions as the third-party
quorum node.
● AZ1 and AZ2 can access services at the same time to implement dual-AZ
active-active mode.
● AZ3 serves as the quorum AZ. If one AZ is faulty, the majority of ETCD nodes
can survive, ensuring data consistency.
● Streaming replication is used for data synchronization between primary and
standby DNs. Data is synchronized across AZs, preventing data loss.
● If a standby DN is faulty, services are not interrupted. If the primary DN is
faulty, a primary/standby failover is automatically triggered.
● This solution provides high availability for data center faults. If AZ1 or AZ2 is
faulty, all services in the faulty AZ are automatically switched to the other AZ.
After the failover is complete, services can continue running.
● If any of AZ1 or AZ2 and the quorum AZ are faulty, users need to manually
start the faulty AZs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1059
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1060
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1061
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1062
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1063
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1064
Huawei Cloud Stack
Solution Description 14 Database Services
● There are four copies of data. If one node is faulty, the system still has three
copies of data. In addition, any standby node can be promoted to primary.
● The intra-city DR provides high availability for data center faults. If AZ1, AZ2
or AZ3 is faulty, all services in the faulty AZ are automatically switched to the
other AZ. After the failover is complete, services can continue running. If any
of AZ1 or AZ2 and the quorum AZ are faulty, users need to manually start the
faulty AZs.
● If a region is faulty, users need to manually switch services to the normal
region.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1065
Huawei Cloud Stack
Solution Description 14 Database Services
● A complete database cluster is deployed in both the local and remote data
centers.
● Streaming replication is used to synchronize data between the primary and
standby DNs. Data is synchronized to at least one standby DN to ensure zero
RPO.
● If a standby DN is faulty, services are not interrupted. If the primary DN is
faulty, a primary/standby failover is automatically triggered.
● There are three copies of data. If one node is faulty, the system still has two
copies of data. In addition, any standby node can be promoted to primary.
● The intra-city DR provides high availability for data center faults. If AZ1, AZ2
or AZ3 is faulty, all services in the faulty AZ are automatically switched to the
other AZ. After the failover is complete, services can continue running.
● If a region is faulty, users need to manually switch services to the normal
region.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1066
Huawei Cloud Stack
Solution Description 14 Database Services
● A complete database cluster is deployed in both the local and remote data
centers.
● Streaming replication is used to synchronize data between the primary and
standby DNs. Data is synchronized to at least one standby DN to ensure zero
RPO.
● If a standby DN is faulty, services are not interrupted. If the primary DN is
faulty, a primary/standby failover is automatically triggered.
● There are three copies of data. If one node is faulty, the system still has two
copies of data. In addition, any standby node can be promoted to primary.
● If a region is faulty, users need to manually switch services to the normal
region.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1067
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1068
Huawei Cloud Stack
Solution Description 14 Database Services
One service AZ
and the quorum
AZ can be
deployed in the
same equipment
room as the
primary
equipment
room.
For details, see
Intra-city HA
scenario 1:
intra-city 3-AZ
4-replica
deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1069
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1070
Huawei Cloud Stack
Solution Description 14 Database Services
Three remote
service AZs.
Each service AZ
with one replica
is deployed in
one equipment
room.
For details, see
DR scenario 3:
intra-city 3-AZ
and remote 3-
AZ deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1071
Huawei Cloud Stack
Solution Description 14 Database Services
One remote
service AZ with
three replicas
For details, see
DR scenario 4:
intra-city 3-AZ
and remote 1-
AZ deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1072
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1073
Huawei Cloud Stack
Solution Description 14 Database Services
One remote
service AZ with
a single replica
For details, see
Primary/
standby DR
scenario 6:
intra-city 3-AZ
and remote 1-
AZ single-
replica
deployment
NOTICE
BMSs (enhanced gateway) are used, which depends on the EP2.0 network used by
OBS.
Intra-city HA deployment
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1074
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1075
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1076
Huawei Cloud Stack
Solution Description 14 Database Services
Intra-city + remote DR
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1077
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1078
Huawei Cloud Stack
Solution Description 14 Database Services
● If the replay of the DR cluster can catch up with that of the primary cluster,
the average RTO of failover is less than 1 minute (the specific time is affected
by the number of logs to be replayed after the database cluster is restarted).
● If the replay of the DR cluster can catch up with that of the primary cluster,
the average RTO of switchover is less than 2 minutes (the specific time is
affected by the number of logs to be replayed after the database cluster is
restarted).
● A complete database cluster is deployed in both the local and remote data
centers.
● Streaming replication is used to synchronize data between the primary and
standby DNs. Data is synchronized to at least one standby DN to ensure zero
RPO.
● If a standby DN is faulty, services are not interrupted. If the primary DN is
faulty, a primary/standby failover is automatically triggered.
● There are three copies of data. If one node is faulty, the system still has two
copies of data. In addition, any standby node can be promoted to primary.
● The intra-city DR provides high availability for data center faults. If AZ1, AZ2
or AZ3 is faulty, all services in the faulty AZ are automatically switched to the
other AZ. After the failover is complete, services can continue running.
● If a region is faulty, users need to manually switch services to the normal
region.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1079
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1080
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1081
Huawei Cloud Stack
Solution Description 14 Database Services
● A complete database cluster is deployed in both the local and remote data
centers.
● Streaming replication is used to synchronize data between the primary and
standby DNs. Data is synchronized to at least one standby DN to ensure zero
RPO.
● If a standby DN is faulty, services are not interrupted. If the primary DN is
faulty, a primary/standby failover is automatically triggered.
● There are three copies of data. If one node is faulty, the system still has two
copies of data. In addition, any standby node can be promoted to primary.
● The intra-city DR provides high availability for data center faults. If AZ1, AZ2
or AZ3 is faulty, all services in the faulty AZ are automatically switched to the
other AZ. After the failover is complete, services can continue running.
● If a region is faulty, users need to manually switch services to the normal
region.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1082
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1083
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1084
Huawei Cloud Stack
Solution Description 14 Database Services
Maximum number of 32
columns in a single
table index
Cross-region RTO < 10 min (Streaming DR: The write speed of Xlogs in a
single shard cannot be greater than 10 MB/s.)
Intra-AZ RPO 0
Cross-AZ RPO 0
Cross-region RPO < 10s (Streaming DR: The write speed of Xlogs in a
single shard cannot be greater than 10 MB/s.)
Intra-city dual-cluster 0
RPO
Note:
● Note: In the manual startup scenario, RTO indicates the software execution
time.
● Cross-region DR (OBS solution) requires that the traffic of a single shard does
not exceed 4 Mbit/s (about 1,000 TPS). You can determine whether to use this
solution based on your workloads.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1085
Huawei Cloud Stack
Solution Description 14 Database Services
After GaussDB is installed or upgraded, you need to load license. Otherwise, new
resources may fail to be provisioned or added.
You need to search for business model in the LLD template of the base installation
project. If the value is BusinessModelOne/BusinessModelTwo, you need to apply
for a cloud service license.
NOTICE
● If the business model cannot be found in the template, contact the frontline
delivery manager to confirm the business model in the customer contract.
● If the current site is used for testing, the frontline manager can apply for a
temporary license or use the default resources, but the new license is required
for commercial use.
● If no license resource certificates are imported into the environment, you can
use resources (288 vCPUs) for 60 days by default. When the service resource
usage exceeds the total resources authorized by the license or the license is
expired, new resources cannot be added.
● If a license resource certificate is imported into the environment, new resources
are controlled based on the time when the license was imported and the total
number of resources authorized by the license.
● For details about cloud service license control items, see "Other Information" >
"Cloud Service License Control Items" in the Huawei Cloud Stack License Guide.
Function Constraints
Database root Only the root user permissions are available on the
permissions instance creation page.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1086
Huawei Cloud Stack
Solution Description 14 Database Services
Function Constraints
GaussDB backup files GaussDB backup files are stored in OBS buckets and are
not visible to you.
Data restoration To prevent data loss, you are advised to back up key
data before data restoration.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1087
Huawei Cloud Stack
Solution Description 14 Database Services
Creating a No Yes
full backup
Creating a No Yes
differential
backup
Deleting a No Yes
backup
Modifying No Yes
the backup
policy
Restoring No Yes
to the
original
instance
Restoring No Yes
to a new
instance
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1088
Huawei Cloud Stack
Solution Description 14 Database Services
Rebuilding No Yes
a deleted
instance
Repairing a No No
node
Replacing a No No
node
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1089
Huawei Cloud Stack
Solution Description 14 Database Services
Creating an Yes
instance
Restarting a DB Yes
instance
Modifying Yes
parameters
Applying Yes
parameters
Resetting a Yes
password
Creating a Yes
differential
backup
Deleting a Yes
backup
Restoring to Yes
the original
instance
Restoring to a Yes
new instance
Scaling up Yes
storage
In-place Yes
upgrade
Viewing Yes
monitoring
metrics
Deleting an Yes
instance
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1090
Huawei Cloud Stack
Solution Description 14 Database Services
Rebuilding a Yes
deleted
instance
Creating a Yes
database
Querying a Yes
database
Creating a Yes
schema and
user
Deleting a Yes
schema and
user
Performing Yes
database
operations
Repairing a No
node
Replacing a No
node
Establishing a Yes
remote DR
system
Adding nodes No
Backing up No
tables
PITR No
Service Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1091
Huawei Cloud Stack
Solution Description 14 Database Services
Service Description
Virtual Private Isolates your network and controls access to your GaussDB
Cloud (VPC) instances.
Data Admin Provides a visualized GUI interface for you to connect and
Service (DAS) manage cloud databases.
Real-Time Migration
For a real-time migration, DRS needs to be connected to both the source DB and
destination DB. In addition, the source DB, destination DB, and migration objects
must be configured, and then DRS can perform the migration automatically.
Online migration supports multiple types of networks, such as public networks,
VPCs, VPNs, and direct connections. With these network connections, migration
can be performed between different cloud platforms, from on-premises databases
to cloud databases, or on cloud databases across regions.
DRS supports incremental migration, which ensures service continuity while
minimizing the impact of service downtime and migration. Databases can thereby
be smoothly migrated to the cloud, and all database objects can be migrated.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1092
Huawei Cloud Stack
Solution Description 14 Database Services
Real-Time Synchronization
Data synchronization refers to the real-time flow of key service data from one
source to another while consistency of data can be ensured.
It is different from data migration. Migration means moving your overall database
from one platform to another. Synchronization refers to the continuous flow of
data between different services.
It can be used in many scenarios such as real-time analysis, report system, and
data warehouse environment.
Data synchronization focuses on tables and data. It can meet various
requirements, such as many-to-one, one-to-many synchronization, dynamic
addition and deletion of tables, and synchronization between tables with different
names.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1093
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1094
Huawei Cloud Stack
Solution Description 14 Database Services
14.3.2 Advantages
Easy to Use
DRS simplifies migration procedures and does not require too much technical
knowledge. Traditional migration requires professional technical personnel and
migration procedures are complicated.
Fast Setup
DRS sets up a migration task within minutes. Traditional migration takes several
days, weeks, or even months to set up.
Low Costs
DRS saves traditional database administrator (DBA) costs and hardware costs, and
supports on-demand pricing.
Secure
DRS allows you to query the migration progress, check migration logs, and
compare migration items, so you can easily complete migration and
synchronization tasks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1095
Huawei Cloud Stack
Solution Description 14 Database Services
Database Types
DRS supports data migration between multiple data sources. The following table
lists the supported data sources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1096
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1097
Huawei Cloud Stack
Solution Description 14 Database Services
Migration Methods
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1098
Huawei Cloud Stack
Solution Description 14 Database Services
To MongoDB -> DDS ● Replica set -> ● Replica set -> Single
the Single node node
clou ● Replica set -> ● Replica set -> Replica
d Replica set set
● Replica set -> ● Replica set -> Cluster
Cluster ● Single node -> Single
● Single node -> node
Single node ● Single node ->
● Single node -> Replica set
Replica set ● Single node ->
● Single node -> Cluster
Cluster ● Cluster -> Cluster
● Cluster -> NOTE
Cluster ● If you need to perform
an incremental
migration for a single-
node instance, the
source database must
be a single-node
instance on the
current cloud.
● If the source database
is a DDS cluster
instance, an
incremental migration
is supported only in
the VPC scenario.
● The source database
cannot be a
GaussDB(for Mongo)
instance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1099
Huawei Cloud Stack
Solution Description 14 Database Services
Database Versions
NOTE
Data cannot be migrated from a newer version database to an older version database.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1100
Huawei Cloud Stack
Solution Description 14 Database Services
Network Types
DRS supports data migration through a Virtual Private Cloud (VPC), Virtual Private
Network (VPN), Direct Connect, or public network. Table 14-37 lists the
application scenarios of each network type and required preparations, and Table
14-38 lists the supported network types of each migration scenario.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1101
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1102
Huawei Cloud Stack
Solution Description 14 Database Services
Advanced Features
DRS supports multiple features to ensure successful data migration.
Flow control Allows you to limit the overall migration speed to make
the impact of migration on bandwidth and database I/O
controllable.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1103
Huawei Cloud Stack
Solution Description 14 Database Services
Feature Description
Database Types
DRS supports synchronization between databases of various types, and many-to-
one synchronization.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1104
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1105
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1106
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1107
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1108
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1109
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1110
Huawei Cloud Stack
Solution Description 14 Database Services
Database Versions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1111
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1112
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1113
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1114
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1115
Huawei Cloud Stack
Solution Description 14 Database Services
Synchronization Methods
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1116
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1117
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1118
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1119
Huawei Cloud Stack
Solution Description 14 Database Services
Network Types
DRS supports real-time synchronization through a Virtual Private Cloud (VPC),
Virtual Private Network (VPN), Direct Connect, or public network. Table 14-43
lists the application scenarios of each network type and the required preparations,
and Table 14-44 lists the supported network types of each migration scenario.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1120
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1121
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1122
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1123
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1124
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1125
Huawei Cloud Stack
Solution Description 14 Database Services
Advanced Features
DRS supports multiple features to ensure successful data synchronization.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1126
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1127
Huawei Cloud Stack
Solution Description 14 Database Services
Feature Description
Database Types
DRS supports disaster recovery (DR) for the following databases.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1128
Huawei Cloud Stack
Solution Description 14 Database Services
Database Versions
Network Types
DRS supports disaster recovery through a Virtual Private Network (VPN), Direct
Connect, or public network. Table 14-48 lists the application scenarios of each
network type and the required preparations, and Table 14-49 lists the supported
network types of each DR scenario.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1129
Huawei Cloud Stack
Solution Description 14 Database Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1130
Huawei Cloud Stack
Solution Description 14 Database Services
This section provides the mappings between different DB engine types for your
reference.
VPC
VPC-based migration refers to an online migration that the source and destination
databases are in the same VPC or two VPCs that can communicate with each
other. No additional network services are required.
VPN
VPN-based migration refers to an online migration where the source and
destination databases are in the same VPN. The VPN establishes a secure,
encrypted communication tunnel that complies with industry standards between
your data centers and the cloud platform. Through this tunnel, DRS seamlessly
migrates data from the data centers to the cloud.
Direct Connect
Direct Connect enables you to establish a dedicated network connection from your
data center to the cloud platform. With Direct Connect, you can use a dedicated
network connection to connect your data center to VPCs to enjoy a high-
performance, low-latency, and secure network.
Replication Instance
A replication instance refers to an instance that performs the migration task. It
exists in the whole lifecycle of a migration task. DRS uses the replication instance
to connect to the source database, read source data, and replicate the data to the
destination database.
Migration Logs
A migration log refers to the log generated during database migration. Migration
logs are classified into the following levels: warning, error, and info.
Synchronization Instance
A synchronization instance refers to an instance that performs the synchronization
task. It exists in the whole lifecycle of a synchronization task. DRS uses the
synchronization instance to connect to the source database, read source data, and
synchronize the data to the destination database.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1131
Huawei Cloud Stack
Solution Description 14 Database Services
Synchronization Logs
A synchronization log refers to the log generated during database synchronization.
Synchronization logs are classified into the following levels: warning, error, and
info.
Task Check
Before starting a migration task, you need to check whether the source and
destination databases have met all migration requirements. If any check item fails,
you need to rectify the fault and check the task again. Only when all check items
are successful the task can start.
Region and AZ
A region and availability zone (AZ) identify the location of a data center. You can
create resources in a specific region and AZ.
Account Entrustment
DRS will entrust your account to the administrator to implement some functions.
For example, if you enable scheduled startup tasks, DRS will automatically entrust
your account to the DRS administrator during the task creation to implement
automated management on the scheduled tasks.
Temporary Accounts
To ensure that your database can be successfully migrated to the RDS for MySQL
DB instance or the GaussDB(for MySQL) instance, DRS automatically creates
temporary accounts drsFull and drsIncremental in the destination database
during full migration and incremental migration, respectively. After the migration
task is complete, DRS automatically deletes the temporary account.
NOTICE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1132
Huawei Cloud Stack
Solution Description 14 Database Services
High Availability
If the primary replication or synchronization instance fails, it automatically fails
over to the standby replica, preventing service interruption and improving the
success rate of migration.
If a replication or synchronization instance fails, the system will automatically
restart the instance and retry the task. In this case, the task status changes to
Fault rectification. If the instance is still faulty after being restarted, the system
automatically creates an instance. After the instance is created, the system retries
the task again. The high availability management applies to the following tasks:
● Full migration
● Incremental migration
● Full synchronization
● Incremental synchronization
Data Encryption
Before saving sensitive information and private data in a database, encrypt data to
reduce the risk of information leakage.
Connection Encryption
Use the Secure Sockets Layer (SSL) to encrypt connections between applications
and DB instances to enhance data transmission security.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1133
Huawei Cloud Stack
Solution Description 14 Database Services
Step 2 Click in the upper left corner of the page and select a region and a resource
space. Choose Database > Data Replication Service. The Database Replication
Service page is displayed.
----End
RDS
DRS can migrate data from your databases to the RDS databases in the cloud. For
more information about RDS, see the Relational Database Service User Guide.
● VPC
● VPN
● Direct Connect
● Public network
DDS
DRS can migrate data from your databases to the DDS databases in the cloud. For
more information about DDS, see the Document Database Service User Guide.
● VPC
● VPN
● Direct Connect
● Public network
GaussDB(for MySQL)
DRS can migrate data from your databases to GaussDB(for MySQL) on the current
cloud. For more information about GaussDB(for MySQL), see the GaussDB(for
MySQL) User Guide.
Supported network types during migration to GaussDB(for MySQL) on the current
cloud:
● VPC
● VPN
● Direct Connect
● Public network
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1134
Huawei Cloud Stack
Solution Description 14 Database Services
DDM
DRS helps you migrate data from your databases to Distributed Database
Middleware (DDM) in the cloud. For more information about DDM, see the
Distributed Database Middleware Service User Guide.
Supported network types during migration to DDM:
● VPC
● VPN
● Direct Connect
● Public network
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1135
Huawei Cloud Stack
Solution Description 15 EI Services
15 EI Services
ECS MRS 3.3.0-LTS After the MRS console and the corresponding MRS
cluster image are installed, create an MRS cluster based on
ECSs on the console.
BMS MRS 3.3.0-LTS After the MRS console and the corresponding MRS
cluster image are installed, create an MRS cluster based on
BMSs on the console.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1136
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
System Architecture
Figure 15-1 shows the logical architecture of an MRS cluster.
● CDL
A simple, efficient, and real-time data integration service.
● ClickHouse
A column-based Database Management System (DBMS) for On-Line
Analytical Processing (OLAP).
● DBService
A conventional, high-reliability, relational database. It provides metadata
storage service for Hive, Hue, Oozie, Loader, Metadata, and Redis.
● Doris
An easy-to-use, high-performance, and real-time analytical database.
● Elasticsearch
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1137
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1138
Huawei Cloud Stack
Solution Description 15 EI Services
● Kafka
A distributed, real-time message publishing and subscription system with
partitions and replicas. It provides scalable, high-throughput, low-latency, and
highly reliable message dispatching services.
● KMS
A key management server compiled based on the KeyProvider API.
● Loader
An enhanced open-source tool based on Sqoop. It loads and implements data
exchange between MRS and relational databases. It provides representational
state transfer (REST) application programming interfaces (APIs) for third-
party scheduling platforms.
● Manager
As an O&M system, Manager implements highly reliable and secure cluster
management for MRS. It supports installation and deployment, monitoring,
alarm management, user management, permission management, audit,
service management, and health check of large clusters.
● MapReduce
A distributed data processing framework. It implements rapid, parallel
processing of massive data.
● Metadata
A data warehouse component (for Hive and HBase) used to extract metadata.
It allows labels to be manually set for each metadata for data analysis and
search.
● Oozie
Orchestrates and executes jobs for open-source Hadoop components. It runs
in a Java servlet container (for example, Tomcat) as a Java web application
and uses a database to store workflow definitions and running workflow
instances (including the status and variables of the instances).
● Ranger
A centralized framework based on the Hadoop platform. It provides
permission control APIs such as monitoring, operation, and management APIs
for complex data.
● Redis
An open-source and high-performance key-value distributed storage
database. It supports a variety of data types, supplementing the key-value
storage such as memcached and meeting the real-time and high-concurrency
requirements.
● RTD
– Containers
Provides physical environments for the running of Business Logic Unit
(BLU) instances and controls the start and stop of the BLUs.
Provides Access Load Balance (ALB) to connect to load balancers. ALB
implements socket access. Specifically, it distributes requests of different
projects to service instances on the platform based on different
processing policies and implements conversion between protocol
interfaces. ALB is not provided as an independent service but integrated
in Containers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1139
Huawei Cloud Stack
Solution Description 15 EI Services
– MOTService
Provides fast and large-throughput access capabilities and uses stored
procedures to quickly process service logic at the database layer. It is
deployed in active/standby mode.
– RTDService
Functions as the unified web definition entry of RTD and allows users to
define tenants, event sources, dimensions, variables, models, and rules.
● Solr
A high-performance, full-text search server based on Apache Lucene. It
extends Lucene and provides a query language richer than that provided by
Lucene. The configurable and scalable Solr optimizes the query performance
and provides a comprehensive function management GUI, which makes it an
excellent full-text search engine.
● Spark
A distributed in-memory computing framework.
● Tez
Supports the distributed computing framework of directed acyclic graphs
(DAGs).
● Yarn
A general resource module that functions as a resource management system,
which manages and schedules resources for various applications.
● ZooKeeper
Enables highly reliable distributed coordination. It helps prevent single point
of failures (SPOFs) and provides reliable services for applications.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1140
Huawei Cloud Stack
Solution Description 15 EI Services
Region and AZ
A region is a geographic area where MRS is located.
Availability zones (AZs) in the same region can communicate with each other over
the intranet, but different regions are not connected over intranet.
MRS can be used in data centers of different regions. You can subscribe to MRS in
different regions and design applications to better meet customer requirements or
comply with local laws and other demands.
Each region contains many AZs where power resources and networks are
physically isolated. AZs in the same region can communicate with each other over
the intranet, but those in different regions cannot. Each AZ provides cost-effective
and low-latency network connections that are unaffected by faults which may
occur in other AZs. Therefore, provisioning MRS in separate AZs protects your
applications against local faults that occur in a specific location.
Hadoop
Hadoop is a distributed system framework. It allows users to develop distributed
applications using high-speed computing and storage provided by clusters without
knowing the underlying details of the distributed system. It can also reliably and
efficiently process massive data in scalable, distributed mode. Hadoop is reliable
because it maintains multiple work data duplicates, enabling distributed
processing for failed nodes. Hadoop is highly efficient because it processes data in
parallel mode. Hadoop is scalable because it processes data at the PB level.
Hadoop consists of the Hadoop distributed file system (HDFS), MapReduce,
HBase, and Hive.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1141
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
For an ECS/BMS cluster, the system groups nodes based on node specifications for easier
management. Different node groups use different VM specifications.
● Both management and controller nodes are master nodes. By default, management and
controller nodes form a master node group when an ECS/BMS cluster is created.
● Data nodes either belong to the core node group or the task node group. You can scale
the storage space or computing capabilities of MRS by adding Core nodes or Task nodes
without modifying the system architecture. The scaling reduces O&M costs. Deployment
instances in a data node group are typically of the same type.
NOTE
A task node group is a node group whose type is set to Task when a cluster is created or a
node group is added. Only the NodeManager role (except mandatory roles) can be
deployed in this node group.
15.1.5 Components
15.1.5.1 CarbonData
CarbonData is a new Apache Hadoop native data-store format. CarbonData
allows faster interactive queries over PetaBytes of data using advanced columnar
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1142
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1143
Huawei Cloud Stack
Solution Description 15 EI Services
● Stores data along with index: Significantly accelerates query performance and
reduces the I/O scans and CPU resources, when there are filters in the query.
CarbonData index consists of multiple levels of indices. A processing
framework can leverage this index to reduce the task it needs to schedule and
process, and it can also perform skip scan in more finer grain unit (called
blocklet) in task side scanning instead of scanning the whole file.
● Operable encoded data: Through supporting efficient compression and global
encoding schemes, CarbonData can query on compressed/encoded data. The
data can be converted just before returning the results to the users, which is
"late materialized".
● Supports various use cases with one single data format: like interactive OLAP-
style query, Sequential Access (big scan), and Random Access (narrow scan).
Key technologies and advantages of CarbonData
● Quick query response: CarbonData features high-performance query. The
query speed of CarbonData is 10 times of that of Spark SQL. It uses dedicated
data formats and applies multiple index technologies, global dictionary code,
and multiple push-down optimizations, providing quick response to TB-level
data queries.
● Efficient data compression: CarbonData compresses data by combining the
lightweight and heavyweight compression algorithms. This significantly saves
60% to 80% data storage space and the hardware storage cost.
For details about CarbonData architecture and principles, see https://
carbondata.apache.org/.
15.1.5.2 CDL
Overview
Change Data Loader (CDL) is a real-time data integration service based on Kafka
Connect. The CDL service captures data change events from various OLTP
databases and push them to Kafka. Then, Sink Connector pushes the events to the
big data ecosystem.
Currently, CDL supports MySQL, PostgreSQL, Oracle, Hudi, Kafka, and ThirdParty-
Kafka data sources. Data can be written to Kafka, Hudi, DWS, and ClickHouse.
CDL structure
The CDL service contains two important roles: CDLConnector and CDLService.
CDLConnector, including Source Connector and Sink Connector, is the instance for
executing data capture jobs. CDLService is the instance for managing and creating
jobs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1144
Huawei Cloud Stack
Solution Description 15 EI Services
The CDLService instances of the CDL service work in multi-active mode. Any
CDLService instance can perform service operations. The CDLConnector instances
work in distributed mode and provide HA and rebalance capabilities. When tasks
are created, the number of tasks specified is balanced among CDLConnector
instances in a cluster to ensure that the number of tasks running on each instance
is similar. If a CDLConnector instance is abnormal or a node breaks down, the
number of tasks are rebalanced on other nodes.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1145
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.3 ClickHouse
Introduction to ClickHouse
ClickHouse is an open-source columnar database oriented to online analysis and
processing. It is independent of the Hadoop big data system and features ultimate
compression rate and fast query performance. In addition, ClickHouse supports
SQL query and provides good query performance, especially the aggregation
analysis and query performance based on large and wide tables. The query speed
is one order of magnitude faster than that of other analytical databases.
During data query, columnar storage can reduce the data scanning range and
data transmission size, thereby improving data query efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1146
Huawei Cloud Stack
Solution Description 15 EI Services
row: 0 1 2 N
Flag: 0 1 1 ...
Event: 1 1 1 ...
Vectorized executor
ClickHouse uses SQL as the query language and provides standard SQL query APIs
for existing third-party analysis visualization systems to easily integrate with
ClickHouse.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1147
Huawei Cloud Stack
Solution Description 15 EI Services
The ClickHouse cluster consists of one or more shards, and each shard corresponds
to one ClickHouse service node. The maximum number of shards depends on the
number of nodes (one shard corresponds to only one service node).
ClickHouse introduces the concepts of local table and distributed table. A local
table is equivalent to a data shard. A distributed table itself does not store any
data. It is an access proxy of the local table and functions as the sharding
middleware. With the help of distributed tables, multiple data shards can be
accessed by using the proxy, thereby implementing distributed query.
ClickHouse Applications
ClickHouse is short for Click Stream and Data Warehouse. It is initially applied to a
web traffic analysis tool to perform OLAP analysis for data warehouses based on
page click event flows. Currently, ClickHouse is widely used in Internet advertising,
app and web traffic analysis, telecommunications, finance, and Internet of Things
(IoT) fields. It is applicable to business intelligence application scenarios and has a
large number of applications and practices worldwide. For details, visit https://
clickhouse.tech/docs/en/introduction/adopters/.
Replica Mechanism
ClickHouse uses Zookeeper to implement the replica mechanism through the
ReplicatedMergeTree engine. The replica mechanism is a multi-master
architecture. An INSERT statement can be sent to any replica, and other replicas
perform asynchronous data replication.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1148
Huawei Cloud Stack
Solution Description 15 EI Services
● The Replica mechanism is the basis for implementing HA, load balance, and
migration/upgrade functions.
● High availability: The system monitors the synchronization status of replica
data, identifies faulty nodes, and performs fault recovery when the nodes
recover, ensuring overall high availability of services.
Distributed query
ClickHouse provides linear scaling through sharding and distributed table
mechanisms.
● The sharding mechanism is used to solve the performance bottleneck of a
single node. Data in a table is split horizontally to multiple nodes. Data on
different nodes is not duplicated. In this way, ClickHouse can be linearly
expanded by adding shards.
● Distributed table: When querying sharded data, a distributed table is used for
query. The distributed table engine does not store any data. It is only a layer-1
proxy and can automatically route data to each shard node in the cluster to
obtain data. That is, a distributed table needs to work together with other
data tables.
As shown in the following figure Figure 15-4, the distributed table
table_distributed needs to be queried. The distributed table automatically routes
query requests to shard nodes and aggregates results.
MergeTree Engine
MergeTree and its family (*MergeTree) are ClickHouse's most powerful storage
engine, designed to insert large amounts of data into a single table. Data is
quickly written as data blocks. Data blocks are asynchronously merged in the
background to ensure efficient insertion and query performance.
The following functions are supported:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1149
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1150
Huawei Cloud Stack
Solution Description 15 EI Services
LoadBalance
ClickHouse uses the LoadBalance-based deployment architecture to automatically
distribute user access traffic to multiple backend nodes, expanding service
capabilities to external systems and improving fault tolerance.
15.1.5.4 Containers
Overview
Access Load Balance (ALB) allows external systems to access clusters through
HTTP or sockets. After requests are received, ALB forwards them to BLUs in the
cluster for conversion between interfaces of different protocols. BLUs are
developed based on the service consumer specifications and provide RESTful APIs
for external systems.
NOTE
In FusionInsight RTD, ALB is not provided as an independent service but integrated with
Containers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1151
Huawei Cloud Stack
Solution Description 15 EI Services
Structure
Principles
ALB provides multi-protocol access, which improves the networking adaptability of
FusionInsight RTD. In a complex network where the FusionInsight RTD client and
cluster are not in the same network segment, ALB can be used as the gateway to
process messages, distribute requests to service instances, and control distribution
policies.
After FusionInsight RTD is installed, the system administrator can deploy ALB on
the platform. Physically, ALB is a preset BLU in FusionInsight RTD.
Overview
Based on the open source Apache Tomcat 8, Containers is a lightweight
application container that supports standard functions of the community edition
and incorporates enhancements for enterprise applications. It provides running
environment resources for and manages BLUs deployed on the FusionInsight RTD
platform and supports heterogeneous underlying platforms.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1152
Huawei Cloud Stack
Solution Description 15 EI Services
Tomcat Server is an open source and lightweight web application server for small-
and medium-sized systems and scenarios with few concurrent access requests. It
provides the following functions:
Structure
After an event source is brought online, its BLU is deployed in a container. In
FusionInsight RTD, a maximum of five containers can be installed on each host.
Principles
FusionInsight RTD manages applications in groups. Containers in a cluster can
belong to only one group at a time, but different BLUs in one group can be
deployed in the same container at the same time. Each BLU creates a BLU
instance in a container. See Figure 15-8.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1153
Huawei Cloud Stack
Solution Description 15 EI Services
Application Management
FusionInsight RTD deploys Tomcat clusters and distributes BLUs, and also monitors
the Tomcat clusters and BLUs.
After obtaining an application developed by a service developer, the system
administrator can easily and quickly deploy the application to a cluster with the
UI.
Service Governance
Developers can quickly develop RESTful services in BLUs. FusionInsight RTD
manages services provided by BLUs, including controlling service access, managing
load balancing policy, and performing grayscale release. FusionInsight RTD also
monitors calling latency and TPS of the services.
Figure 15-10 shows the basic service invoking process in FusionInsight RTD.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1154
Huawei Cloud Stack
Solution Description 15 EI Services
1. After the service provider instance is started, it registers its services with the
registration center.
ZooKeeper provides the registration center and manages the list containing
the mappings between services and service addresses.
2. The service consumer subscribes to the specific service address list from the
registration center when the consumer starts.
3. The registration pushes the changes in the service address list to the clients of
related services.
4. The service consumer selects a service address based on service management
policies and accesses the service.
15.1.5.5 DBService
Overview
DBService is a HA storage system for relational databases, which is applicable to
the scenario where a small amount of data (about 10 GB) needs to be stored, for
example, component metadata. DBService can only be used by internal
components of a cluster and provides data storage, query, and deletion functions.
DBService Architecture
DBService in the cluster works in active/standby mode. Two DBServer instances
are deployed and each instance contains three modules: HA, Database, and
FloatIP.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1155
Huawei Cloud Stack
Solution Description 15 EI Services
Databas Database module. This module stores the metadata of the Client
e module.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1156
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.6 Doris
Introduction to Doris
Doris is a high-performance, real-time analytical database based on MPP
architecture, known for its extreme speed and ease of use. It can return query
results of mass data in sub-seconds and can support high-concurrency point
queries and high-throughput complex analysis. All this makes Apache Doris an
ideal tool for report analysis, ad-hoc query, unified data warehouse, and data lake
query acceleration. On Doris, users can build various applications, such as user
behavior analysis, AB test platform, log retrieval analysis, user portrait analysis,
and order analysis. For more information, see Apache Doris.
Doris Architecture
The following figure shows the overall architecture of Doris. The frontend (FE) and
backend (BE) nodes can be expanded horizontally and infinitely.
Parameter Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1157
Huawei Cloud Stack
Solution Description 15 EI Services
Parameter Description
Doris uses the MPP model for inter-node and intra-node parallel execution,
making it suitable for distributed joins of large tables.
It also supports vectorized query execution engines, adaptive query execution
(AQE) technology, optimization strategies that combine CBO and RBO, and hot
data cache queries.
Basic Concepts
In Doris, data is logically described in the form of tables.
● Rows and Columns
A table consists of rows and columns.
– Row: a row of user data.
– Column: different fields in a row of data.
Columns can be classified into two types: keys and values. From the service
perspective, Key and Value correspond to dimension columns and metric
columns, respectively. In the aggregation model, rows with the same Key
column are aggregated into one row. How Value columns are aggregated is
specified by a user when the table is created.
● Tablets and Partitions
In the Doris storage engine, user data is horizontally divided into several
tablets (also called data buckets). Each tablet contains several rows of data.
The data between the individual tablets does not intersect and is physically
stored independently.
Multiple tablet logically belong to different partitions. A tablet belongs to
only one partition, but a partition can contain multiple tablets. Since the
tablets are physically stored independently, the partitions can be seen as
physically independent, too. Tablet is the smallest physical storage unit for
data operations such as movement and replication.
Multiple partitions form a table. A partition can be regarded as the smallest
logical unit for management. Data can be imported or deleted only for one
partition.
● Data Models
Doris data models are classified into three types: Aggregate, Unique, and
Duplicate.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1158
Huawei Cloud Stack
Solution Description 15 EI Services
– Aggregate Model
When data is imported, rows with the same Key column are aggregated,
and the Value columns are aggregated based on the AggregationType
configured by users. AggregationType has the following modes:
▪ REPLACE: Replace the previous value with the newly imported value.
▪ Merge on Read
The merge on read implementation in the Unique model is
equivalent to Replace implementation in the Aggregate model. The
internal implementation and data storage method are the same.
▪ Merge on Write
The Merge on Write implementation of the Unique model is
completely different from that of the Aggregate model. It can deliver
better performance (almost like that of the Duplicate model) in
aggregation queries with primary key limitations. This
implementation is particularly suitable for aggregation queries and
those using indexes to filter out large scale data.
In a Unique table where Merge on Write is enabled, overwritten and
updated data is marked and deleted during data import, and new
data is written to a new file. During a query, all data marked for
deletion is filtered out at the file level, and the read data is the latest
data. This eliminates the data aggregation process in Merge on Read
and supports pushdown of multiple predicates in many cases.
Performance can be greatly improved in many scenarios, especially in
the case of aggregation queries.
– Duplicate Model
In some multi-dimensional analysis scenarios, primary keys and data
aggregation are not required. Duplicate models can be introduced to
meet such requirements.
Different from the Aggregate and Unique models, the Duplicate model
stores the data as they are and executes no aggregation. Even if there are
two identical rows of data, they will both be retained. The DUPLICATE
KEY in the CREATE TABLE statement is only used to specify based on
which columns the data are sorted.
– Data Model Selection
The data model is established when the table is created and cannot be
modified. Therefore, it is important to select a proper data model.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1159
Huawei Cloud Stack
Solution Description 15 EI Services
▪ The Unique model ensures that the primary key is unique when it is
required. However, pre-aggregation such as Rollup cannot be used in
this case.
○ If you have high performance requirements for aggregation
queries, you are advised to implement Merge on Write added
since version 1.2.
○ The Unique model supports only the update of an entire row. If
you need to update both the unique primary key constraint and
some columns (for example, importing multiple source tables to
one Doris table), you can use the Aggregate model and set the
aggregation type of non-primary key columns to
REPLACE_IF_NOT_NULL.
○ Duplicate is suitable for ad-hoc queries in any dimension.
Although pre-aggregation cannot be used, Duplicate is not
restricted by the aggregation model and can make full use of
the advantages of the column-store model, that is, only related
columns are read, and not all key columns need to be read.
HDFS
Doris can import and export HDFS data and directly query HDFS data sources.
Hudi
Doris can directly query Hudi data sources.
Spark
Spark Doris Connector allows Spark to read data stored in Doris and write data to
Doris.
Flink
Flink Doris Connector allows you to perform operations (read, insert, modify, and
delete) on data stored in Doris through Flink.
Hive
Doris can directly query Hive data sources.
Kafka
Doris can import Kafka data.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1160
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.7 Elasticsearch
Elasticsearch Architecture
The Elasticsearch cluster solution consists of the EsMaster and EsClient, EsNode1,
EsNode2, EsNode3, EsNode4, EsNode5, EsNode6, EsNode7, EsNode8, and EsNode9
processes, as shown in Figure 15-13. Table 15-7 describes the modules.
EsNode1-9 EsNodes 1-9 are data nodes of Elasticsearch. They store index
data, and add, delete, modify, query, and aggregate documents.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1161
Huawei Cloud Stack
Solution Description 15 EI Services
Basic Concepts
● Index: An index is a logical namespace in Elasticsearch, consisting of one or
multiple shards. Apache Lucene is used to read and write data in the index. It
is similar to a relational table instance. One Elasticsearch instance can contain
multiple indexes.
● Document: A document is a basic unit of information that can be indexed.
This document refers to JSON data at the top-level structure or obtained by
serializing the root object. The document is similar to a row in the database.
An index contains multiple documents.
● Mapping: A mapping is used to restrict the type of a field and can be
automatically created based on data. It is similar to the schema in the
database.
● Field: A field is the minimum unit of a document, which is similar to a column
in the database. Each document contains multiple fields.
● EsMaster: The master node that temporarily manages some cluster-level
changes, such as creating or deleting indexes, and adding or removing nodes.
The master node does not participate in document-level change or search.
When traffic increases, the master node does not become the bottleneck of
the cluster.
● EsNode: an Elasticsearch node. A node is an Elasticsearch instance.
● EsClient: an Elasticsearch node. It processes routing requests, searches for
data, and dispatches indexes. It does not store data or manage a cluster.
● Shard: A shard is the smallest work unit in Elasticsearch. It stores documents
that can be referenced in the shard.
● Primary shard: Each document in the index belongs to a primary shard. The
number of primary shards determines the maximum data that can be stored
in the index.
● Replica shard: A replica shard is a copy of the primary shard. It prevents data
loss caused by hardware faults and provides read requests, such as searching
for or retrieving documents from other shards.
● Recovery: Indicates data restoration or data redistribution. When a node is
added or deleted, Elasticsearch redistributes index shards based on the load of
the corresponding physical server. When a faulty node is restarted, data
recovery is also performed.
● Gateway: Indicates the storage mode of an Elasticsearch index snapshot. By
default, Elasticsearch stores an index in the memory. When the memory is
full, Elasticsearch saves the index to the local hard disk. A gateway stores
index snapshots. When the corresponding Elasticsearch cluster is stopped and
then restarted, the index backup data is read from the gateway. Elasticsearch
supports multiple types of gateways, including local file systems (default),
distributed file systems, and Hadoop HDFS.
● Transport: Indicates the interaction mode between Elasticsearch internal
nodes or clusters and the Elasticsearch client. By default, Transmission Control
Protocol (TCP) is used for interaction. In addition, HTTP (JSON format), Thrift,
Servlet, Memcached, and ZeroMQ transmission protocols (integrated through
plug-ins) are supported.
● ZooKeeper cluster: It is mandatory in Elasticsearch and provides functions
such as storage of security authentication information.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1162
Huawei Cloud Stack
Solution Description 15 EI Services
Elasticsearch Principles
● Elasticsearch internal architecture
Elasticsearch provides various access APIs through RESTful APIs or other
languages (such as Java), uses the cluster discovery mechanism, and supports
script languages and various plug-ins. The underlying layer is based on
Lucene, with absolute independence of Lucene, and stores indexes through
local files, shared files, and HDFS, as shown in Figure 15-14.
● Inverted indexing
In the traditional search mode (forward indexing, as shown in Figure 15-15),
documents are searched based on their IDs. During the search, keywords of
each document are scanned to find the keywords that meet the search
criteria. Forward indexing is easy to maintain but is time consuming.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1163
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1164
Huawei Cloud Stack
Solution Description 15 EI Services
Phase 1: The client sends an index request to any node, for example, Node 1.
Phase 2: Node 1 determines the shard (for example, shard 0) to store the file
based on the request. Node 1 then forwards the request to Node 3 where
primary shard P0 of shard 0 exists.
Phase 3: Node 3 executes the request on primary shard P0 of shard 0. If the
request is successfully executed, Node 3 sends the request to all the replica
shard R0 in Node 1 and Node 2 concurrently. If all the replica shards
successfully execute the request, a verification message is returned to Node 3.
After receiving the verification messages from all the replica shards, Node 3
returns a success message to the user.
● Elasticsearch Distributed Searching
The Elasticsearch distributed searching flow consists of query and acquisition.
Figure 15-18 shows the query phase.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1165
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1166
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1167
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1168
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.8 Flink
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1169
Huawei Cloud Stack
Solution Description 15 EI Services
Overview
Flink is a unified computing framework that supports both batch processing and
stream processing. It provides a stream data processing engine that supports data
distribution and parallel computing. Flink features stream processing and is a top
open source stream processing engine in the industry.
Flink provides high-concurrency pipeline data processing, millisecond-level latency,
and high reliability, making it extremely suitable for low-latency data processing.
Figure 15-25 shows the technology stack of Flink.
Flink Architecture
Figure 15-26 shows the Flink architecture.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1170
Huawei Cloud Stack
Solution Description 15 EI Services
As shown in the above figure, the entire Flink system consists of three parts:
● Client
Flink client is used to submit jobs (streaming jobs) to Flink.
● TaskManager
TaskManager is a service execution node of Flink. It executes specific tasks. A
Flink system can have multiple TaskManagers. These TaskManagers are
equivalent to each other.
● JobManager
JobManager is a management node of Flink. It manages all TaskManagers
and schedules tasks submitted by users to specific TaskManagers. In high-
availability (HA) mode, multiple JobManagers are deployed. Among these
JobManagers, one is selected as the active JobManager, and the others are
standby.
For more information about the Flink architecture, visit https://ci.apache.org/
projects/flink/flink-docs-master/docs/concepts/flink-architecture/.
Flink Principles
● Stream, transformation, and operators
A Flink program consists of two building blocks: stream and transformation.
a. Conceptually, a stream is a (potentially never-ending) flow of data
records, and a transformation is an operation that takes one or more
streams as input, and produces one or more output streams as a result.
b. When a Flink program is executed, it is mapped to a streaming dataflow.
A streaming dataflow consists of a group of streams and transformation
operators. Each dataflow starts with one or more source operators and
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1171
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1172
Huawei Cloud Stack
Solution Description 15 EI Services
▪ In the upper part of Figure 15-29, the condensed Source and Map
operators are chained into an Operator Chain, that is, a larger
operator. The Operator Chain, KeyBy, and Sink all represent an
operator respectively and are connected with each other through
streams. Each operator corresponds to one task during the running.
Namely, there are three tasks in the upper part.
Key Features
● Stream processing
The real-time stream processing engine features high throughput, high
performance, and low latency, which can provide processing capability within
milliseconds.
● Various status management
The stream processing application needs to store the received events or
intermediate result in a certain period of time for subsequent access and
processing at a certain time point. Flink provides diverse features for status
management, including:
– Multiple basic status types: Flink provides various states for data
structures, such as ValueState, ListState, and MapState. Users can select
the most efficient and suitable status type based on the service model.
– Rich State Backend: State Backend manages the status of applications
and performs Checkpoint operations as required. Flink provides different
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1173
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1174
Huawei Cloud Stack
Solution Description 15 EI Services
Overview
A Flink cluster has only one JobManager. This has the risks of single point of
failures (SPOFs). There are three modes of Flink: Flink On Yarn, Flink Standalone,
and Flink Local. Flink On Yarn and Flink Standalone modes are based on clusters
and Flink Local mode is based on a single node. Flink On Yarn and Flink
Standalone provide an HA mechanism. With such a mechanism, you can recover
the JobManager from failures and thereby eliminate SPOF risks. This section
describes the HA mechanism of the Flink On Yarn.
Flink supports the HA mode and job exception recovery that highly depend on
ZooKeeper. If you want to enable the two functions, configure ZooKeeper in the
flink-conf.yaml file in advance as follows:
high-availability: zookeeper
high-availability.zookeeper.quorum: ZooKeeper IP address:24002
high-availability.storageDir: hdfs:///flink/recovery
Flink On Yarn
Flink JobManager and Yarn ApplicationMaster are in the same process. Yarn
ResourceManager monitors ApplicationMaster. If ApplicationMaster is abnormal,
Yarn restarts it and restores all JobManager metadata from HDFS. During the
recovery, existing tasks cannot run and new tasks cannot be submitted. ZooKeeper
stores JobManager metadata, such as information about jobs, to be used by the
new JobManager. A TaskManager failure is listened and processed by the
DeathWatch mechanism of Akka on JobManager. When a TaskManager fails, a
container is requested again from Yarn and a TaskManager is created.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1175
Huawei Cloud Stack
Solution Description 15 EI Services
http://hadoop.apache.org/docs/r3.3.1/hadoop-yarn/hadoop-yarn-site/
ResourceManagerHA.html
Standalone
Restoring TaskManager
Restoring JobManager
Flink JobManager and Yarn ApplicationMaster are in the same process. Yarn
ResourceManager monitors ApplicationMaster. If ApplicationMaster is abnormal,
Yarn restarts it and restores all JobManager metadata from HDFS. During the
recovery, existing tasks cannot run and new tasks cannot be submitted.
Restoring jobs
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1176
Huawei Cloud Stack
Solution Description 15 EI Services
To restore jobs, configure a restart policy in the Flink configuration file. Supported
restart policies are fixed-delay, failure-rate, and none. Jobs can be restored only
when the policy is configured to fixed-delay or failure-rate. If the restart policy is
configured to none and Checkpoint is configured for Job, the restart policy is
automatically configured to fixed-delay and the value of restart-strategy.fixed-
delay.attempts specifies the number of retry times.
For details about the three strategies, visit the Flink official website at https://
ci.apache.org/projects/flink/flink-docs-release-1.15/dev/
task_failure_recovery.html. The configuration strategies are as follows:
restart-strategy: fixed-delay
restart-strategy.fixed-delay.attempts: 3
restart-strategy.fixed-delay.delay: 10 s
For details about how to configure job restart strategies, visit https://ci.apache.org/
projects/flink/flink-docs-release-1.15/ops/jobmanager_high_availability.html.
1. The Flink YARN Client first checks whether there are sufficient resources for
starting the YARN cluster. If yes, the Flink YARN client uploads JAR files and
configuration files to HDFS.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1177
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.8.4.1 Window
If a block of data arrives, it is assigned to four different windows (20/5 = 4). That
is, the data is saved as four copies in the memory. When the window size or
sliding period is set to a large value, data will be saved as excessive copies, causing
redundancy.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1178
Huawei Cloud Stack
Solution Description 15 EI Services
If a data block arrives at the 102nd second, it is assigned to windows [85, 105),
[90, 110), [95, 115), and [100, 120).
Window Optimization
As mentioned in the preceding, there are excessive data copies when original data
is saved in SlidingEventTimeWindow and SlidingProcessingTimeWindow. To resolve
this problem, the window that stores the original data is restructured, which
optimizes the storage and greatly lowers the storage space. The window
optimization scheme is as follows:
1. Use the sliding period as a unit to divide a window into different panes.
A window consists of one or multiple panes. A pane is essentially a sliding
period. For example, the sliding period (namely, the pane) of
window(SlidingEventTimeWindows.of(Time.seconds(20),
Time.seconds.of(5))) lasts for 5 seconds. If this window ranges from [100,
120), this window can be divided into panes [100, 105), [105, 110), [110,
115), and [115, 120).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1179
Huawei Cloud Stack
Solution Description 15 EI Services
After optimization, the quantity of data copies in the memory and snapshot is
greatly reduced.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1180
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1181
Huawei Cloud Stack
Solution Description 15 EI Services
● NettySink
NettySink consists of the following major modules:
– RichParallelSinkFunction
NettySink inherits RichParallelSinkFunction and attributes of Sink
operators. The RichParallelSinkFunction API implements following
functions:
▪ Runs the NettySink operator and receives data from the upstream
operator.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1182
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1183
Huawei Cloud Stack
Solution Description 15 EI Services
– NettyServer
NettyServer is the core of the NettySink operator, whose main function is
to create a NettyServer and receive connection requests from NettyClient.
Use NettyServerHandler to send data received from upstream operators
of a same job. The port number and subnet of NettyServer needs to be
configured in the flink-conf.yaml file.
▪ Port range
nettyconnector.sinkserver.port.range: 28444-28943
▪ Subnet
nettyconnector.sinkserver.subnet: 10.162.222.123/24
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1184
Huawei Cloud Stack
Solution Description 15 EI Services
– NettyClient
NettyClient establishes a connection with NettyServer and uses
NettyClientHandler to receive data. Each NettySource operator must have
a unique name (specified by the user). NettyServer determines whether
each client comes from different NettySources based on unique names.
When a connection is established between NettyClient and NettyServer,
NettyClient is registered with NettyServer and the NettySource name of
NettyClient is transferred to NettyServer.
– NettyClientHandler
The NettyClientHandler enables the interaction with publishers and other
operators of the job. When messages are received, NettyClientHandler
transfers these messages to the job. To ensure secure data transmission,
SSL encryption is enabled for the communication with NettySink. The SSL
encryption is enabled only when SSL is enabled and
nettyconnector.ssl.enabled is set to true.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1185
Huawei Cloud Stack
Solution Description 15 EI Services
SQL Join is used to query data based on the relationship between columns in two
or more tables. Flink Stream SQL Join allows you to join two streaming tables and
query results from them. Queries similar to the following are supported:
SELECT o.proctime, o.productId, o.orderId, s.proctime AS shipTime
FROM Orders AS o
JOIN Shipments AS s
ON o.orderId = s.orderId
AND o.proctime BETWEEN s.proctime AND s.proctime + INTERVAL '1' HOUR;
Currently, Stream SQL Join needs to be performed within a specified window. The
join operation for data within the window requires at least one equi-join predicate
and a join condition that bounds the time on both sides. Such a condition can be
defined by two appropriate range predicates (<, <=, >=, >), a BETWEEN predicate,
or a single equality predicate that compares the same type of time attributes
(such as processing time or event time) of both input tables.
The following example will join all orders with their corresponding shipments if
the order was shipped four hours after the order was received.
SELECT *
FROM Orders o, Shipments s
WHERE o.id = s.orderId AND
o.ordertime BETWEEN s.shiptime - INTERVAL '4' HOUR AND s.shiptime
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1186
Huawei Cloud Stack
Solution Description 15 EI Services
(Optional) -ORDER BY: defines the sequence of events in a data flow. The ORDER
BY clause is optional. If it is ignored, non-deterministic sorting is used. Since the
order of events is important in pattern matching, this clause should be specified in
most cases.
(Optional) -ONE ROW PER MATCH | ALL ROWS PER MATCH: defines how to
output the result. ONE ROW PER MATCH indicates that only one row is output
for each matching. ALL ROWS PER MATCH indicates that one row is output for
each matching event.
(Optional) -AFTER MATCH: specifies the start position for processing after the
next pattern is successfully matched.
(Optional) -WITHIN: outputs a pattern clause match only when the match occurs
within the specified time.
-DEFINE: specifies the Boolean condition, which defines the variables used in the
PATTERN clause.
-FIRST() and LAST(): Used in the MEASURES clause to return the value of the
expression evaluated in the first or last row of the row set mapped to the schema
variable.
-NEXT() and PREV(): Used in the DEFINE clause to evaluate an expression using
the previous or next row in a partition.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1187
Huawei Cloud Stack
Solution Description 15 EI Services
-RUNNING and FINAL keywords: Used to determine the semantics required for
aggregation. RUNNING can be used in the MEASURES and DEFINE clauses,
whereas FINAL can be used only in the MEASURES clause.
- Aggregate functions (COUNT, SUM, AVG, MAX, MIN): Used in the MEASURES
and DEFINE clauses.
Query Example
The following query finds the V-shaped pattern in the stock price data flow.
SELECT *
FROM MyTable
MATCH_RECOGNIZE (
ORDER BY rowtime
MEASURES
STRT.name as s_name,
LAST(DOWN.name) as down_name,
LAST(UP.name) as up_name
ONE ROW PER MATCH
PATTERN (STRT DOWN+ UP+)
DEFINE
DOWN AS DOWN.v < PREV(DOWN.v),
UP AS UP.v > PREV(UP.v)
)
In the following query, the aggregate function AVG is used in the MEASURES
clause of SUBSET E consisting of variables related to A and C.
SELECT *
FROM Ticker
MATCH_RECOGNIZE (
MEASURES
AVG(E.price) AS avgPrice
ONE ROW PER MATCH
AFTER MATCH SKIP PAST LAST ROW
PATTERN (A B+ C)
SUBSET E = (A,C)
DEFINE
A AS A.price < 30,
B AS B.price < 20,
C AS C.price < 30
)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1188
Huawei Cloud Stack
Solution Description 15 EI Services
NOTICE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1189
Huawei Cloud Stack
Solution Description 15 EI Services
Example SQL for enabling asynchronous write for HBase Connector sink tables:
CREATE TABLE Customers (
id INT,
name STRING,
country STRING,
zip STRING ) WITH (
'connector' = 'hbase-2.2',
...
'sink.async' = 'true'
);
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1190
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
Handling process: The AsyncSinkWrite operator caches data in the memory and
stores the data that is not written to the sink to the state backend and
checkpoints during checkpointing to prevent data loss. The Count, Time, and
Buffer Size triggers are used to control when data is written to the sink.
RedisAsyncSinkWriter constructs data as Put or Delete operations and calls Redis'
Flush API to send the data to the Redis cluster.
Example SQL for enabling asynchronous write for Redis Connector sink tables:
CREATE TABLE Customers (
id INT,
name STRING,
country STRING,
zip STRING ) WITH (
'connector' = 'redis',
...
'sink.async' = 'true'
);
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1191
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.8.4.8 Join-To-Live
Flink dual-stream join needs to store data in the state backend. Currently, RocksDB
is widely used as the state backend. In scenarios where the time to live (TTL) is
too large, the TTL cannot be determined, or the data traffic increases, heavy traffic
increases the state data and storage pressure. As a result, job stability decreases,
or TTL expiration may cause inaccurate data association.
For services whose data associations are determined, the Join-To-Live (JTL) feature
can be used to reduce the pressure on the state backend. Currently, only JOIN and
INNER JOIN are supported, but they cannot be used together with TTL and small
table broadcast. This feature determines whether data expires based on the
number of associations. It can be configured in either of the following ways:
Example 2:
SELECT a1, a2, a3 from
t1
join /*+ OPTIONS('eliminate-state.left.threshold'='1', 'eliminate-state.right.threshold'='2') */
t2
on a1 = a2
join /*+ OPTIONS('eliminate-state.left.threshold'='3', 'eliminate-state.right.threshold'='4') */
t3
on a2 = a3
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1192
Huawei Cloud Stack
Solution Description 15 EI Services
table.exec.join.eliminate-state.left.threshold
table.exec.join.eliminate-state.right.threshold
In most service scenarios, read and write requests of states access hot data, and
only a few requests access cold data. To ensure the performance of hot data and
save full hot and cold data, Flink provides the tiered storage of states and uses the
TTL of hot data to change hot data to cold data. For details, see section "Enabling
Hot-Cold Separation for State Backends" in the Component Operation Guide.
Hot and cold data supports RocksDB monitoring configuration. To configure cold
data on RocksDB, you only need to add keyword cold to the RocksDB
configuration, as described in Table 15-11. For details about RocksDB
configuration, see section "RocksDB State Backend Optimization" in the
Component Operation Guide.
state.backend.rocksdb.block.blocksize state.backend.rocksdb.cold.block.block
size
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1193
Huawei Cloud Stack
Solution Description 15 EI Services
c. Choose Dashboard > More > Restart Service. Enter the password, and
restart the Flink service as prompted.
● Enable the function by adding dynamic parameters when you submit a job.
If you submit a job in yarn-cluster mode, use the following setting:
flink run -m yarn-cluster -yD
execution.checkpointing.relative.enabled=true
15.1.5.9 Flume
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1194
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1195
Huawei Cloud Stack
Solution Description 15 EI Services
Module Description
As shown in Figure 15-43, a Flume client can have multiple sources, channels, and
sinks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1196
Huawei Cloud Stack
Solution Description 15 EI Services
Principle
Reliability between agents
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1197
Huawei Cloud Stack
Solution Description 15 EI Services
3. Before a commit operation, if the data transmission fails, the last transcription
starts and retransmits the data that fails to be transmitted last time. The
commit operation has written the transaction into a disk. Therefore, the last
transaction can continue after the process fails and restores.
15.1.5.10 FTP-Server
Overview
FTP-Server is a pure Java File Transfer Protocol (FTP) service based on the existing
open FTP protocol. FTP-Server supports FTP and FTP over SSL (FTPS). Each FTP-
Server service supports port and passive data transmission modes. You can
perform operations, such as uploading or downloading files, viewing, creating, or
deleting directories, and modifying file access permissions, on HDFS through an
FTP client.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1198
Huawei Cloud Stack
Solution Description 15 EI Services
FTP-Server Architecture
The FTP-Server service consists of multiple FTP-Server or FTPS-Server processes, as
shown in Figure 15-46.
The FTP-Server service can be deployed on multiple nodes. Each node has only
one FTP-Server instance, and each instance has only one FTP-Server process.
FTP client
The FTP client is used to access the FTP server to upload and download data. The
FTP client is integrated into service applications.
FTP server
The FTP server provides standard FTP APIs externally for FTP clients to access the
HDFS system. The FTP server provides most of the FTP commands.
The basic MRS services implement underlying services of FTP servers. That is, the
Kerberos security authentication service implements user management, the HDFS
service implements data storage, and the OMS service implements service
configuration.
Basic servers
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1199
Huawei Cloud Stack
Solution Description 15 EI Services
● Kerberos security service: supports FTP user management and user login.
● HDFS: implements data storage.
● OMS: configures FTP service parameters and enables or disables FTP services.
Principle
Figure 15-47 shows the FTP-Server data access process.
1. An FTP client connects to the FTP server using the FTP service IP address and
port number.
2. The FTP server uses the information to perform user authentication on the
Kerberos module.
3. After the authentication succeeds, the FTP server accesses HDFS and returns
the file information to the client.
4. The FTP client uses the standard FTP to upload and download files and
manage HDFS file directories.
Security
FTP communication is not encrypted, so that the content, username, password,
and transmission data are easily stolen. Therefore, FTPS is recommended to be
used in untrusted networks. MRS provides FTP-Server to support basic enterprise
and financial applications. FTPS allows data to be encrypted during transmission,
effectively preventing information leakage. When the client uses FTPS, only the
implicit FTP over TLS encryption mode is supported.
The FTP-Server process of FTP is disabled by default. The administrator can enable
it on the FTP service configuration window. A connection can be created (using
the business IP address) only after the service is restarted.
Each node supports 16 FTP/FTPS (user or client) connections by default. To satisfy
performance requirements, FTPS is recommended to be used with the command
channel encrypted but the data channel not encrypted.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1200
Huawei Cloud Stack
Solution Description 15 EI Services
Enhanced Open Source Feature: FTP-based File Transfer to the HDFS File
System
As the storage file system of FTP-Server, HDFS stores all data of FTP-Server.
15.1.5.11 GraphBase
Overview
With the quick development of network technologies, enterprises in the Internet
era are facing massive data. As the number of data sets increases, the query
performance of traditional relational databases deteriorates, especially for some
special service scenarios. Therefore, a new solution is urgently needed to cope with
this problem. To resolve the complex relationship problem, GraphBase came into
being.
In GraphBase, data is stored and queried by graph. A graph contains nodes and
relationships. Nodes and relationships can have labels and attributes, and edges
can have directions. GraphBase is a distributed graph database. Based on the
distributed storage mechanism of HBase, it supports data of tens of billions of
nodes and hundreds of billions of relationships, and provides Spark-based data
import and Elasticsearch-based index mechanisms. GraphBase is widely used in
recommendations, relationship analysis, and financial anti-fraud. GraphBase has
the following features:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1201
Huawei Cloud Stack
Solution Description 15 EI Services
GraphBase architecture
GraphBase contains GraphServer and LoadBalancer.
● Access layer
– Gremlin API: is an open-source standard language API for graph
interactive query based on the Apache TinkerPop Gremlin.
– REST API: includes APIs for graph query, modification, and management,
and graph algorithm enhanced online analysis.
– Load Balancer: provides load sharing for multi-instance GraphServer.
● Compute layer
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1202
Huawei Cloud Stack
Solution Description 15 EI Services
● Financial anti-fraud
● Knowledge graph
● Relationship analysis
● Different service departments can use the same graph database to import
different graphs for application development.
● Different applications use different data. Data is not associated, which
facilitates service isolation.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1203
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1204
Huawei Cloud Stack
Solution Description 15 EI Services
Figure 15-49 shows the relationship between GraphBase and other components.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1205
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.12 Guardian
Guardian Architecture
Figure 15-50 shows the basic architecture of Guardian.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1206
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.13 HBase
HBase Architecture
An HBase cluster consists of active and standby HMaster processes and multiple
RegionServer processes.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1207
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1208
Huawei Cloud Stack
Solution Description 15 EI Services
Module Description
HDFS cluster HDFS provides highly reliable file storage services for HBase. All
HBase data is stored in the HDFS.
HBase Principles
● HBase Data Model
HBase stores data in tables, as shown in Figure 15-53. Data in a table is
divided into multiple Regions, which are allocated by Master to RegionServers
for management.
Each Region contains data within a RowKey range. An HBase data table
contains only one Region at first. As the number of data increases and
reaches the upper limit of the Region capacity, the Region is split into two
Regions. You can define the RowKey range of a Region when creating a table
or define the Region size in the configuration file.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1209
Huawei Cloud Stack
Solution Description 15 EI Services
Module Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1210
Huawei Cloud Stack
Solution Description 15 EI Services
● Metadata Table
The metadata table is a special HBase table, which is used by the client to
locate a region. Metadata table includes hbase:meta table to record region
information of user tables, such as the region location and start and end
RowKey.
Figure 15-55 shows the mapping relationship between metadata tables and
user tables.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1211
Huawei Cloud Stack
Solution Description 15 EI Services
Figure 15-55 Mapping relationships between metadata tables and user tables
a. When you add, delete, modify, and query HBase data, the HBase client
first connects to ZooKeeper to obtain information about the RegionServer
where the hbase:meta table is located. If you modify the NameSpace,
such as creating and deleting a table, you need to access HMaster to
update the meta information.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1212
Huawei Cloud Stack
Solution Description 15 EI Services
b. The HBase client connects to the RegionServer where the region of the
hbase:meta table is located and obtains the RegionServer location where
the region of the user table resides.
c. Then the HBase client connects to the RegionServer where the region of
the user table is located and issues a data operation command to the
RegionServer. The RegionServer executes the command.
To improve data processing efficiency, the HBase client caches region
information of the hbase:meta table and user table. When an application
initiates a second data operation, the HBase client queries the region
information from the memory. If no match is found in the memory, the HBase
client performs the preceding operations to obtain region information.
HBase HA
HMaster in HBase allocates Regions. When one RegionServer service is stopped,
HMaster migrates the corresponding Region to another RegionServer. The
HMaster HA feature is brought in to prevent HBase functions from being affected
by the HMaster single point of failure (SPOF).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1213
Huawei Cloud Stack
Solution Description 15 EI Services
When the client accesses the HBase, it first obtains the HMaster's address based
on the master node information on the ZooKeeper and then establishes a
connection to the active HMaster.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1214
Huawei Cloud Stack
Solution Description 15 EI Services
HIndex
HBase is a distributed storage database of the Key-Value type. Data of a table is
sorted in the alphabetic order based on row keys. If you query data based on a
specified row key or scan data in the scale of a specified row key, HBase can
quickly locate the target data, enhancing the efficiency.
However, in most actual scenarios, you need to query the data of which the
column value is XXX. HBase provides the Filter feature to query data with a
specific column value. All data is scanned in the order of row keys, and then the
data is matched with the specific column value until the required data is found.
The Filter feature scans some unnecessary data to obtain the only required data.
Therefore, the Filter feature cannot meet the requirements of frequent queries
with high performance standards.
HBase HIndex is designed to address these issues. HBase HIndex enables HBase to
query data based on specific column values.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1215
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1216
Huawei Cloud Stack
Solution Description 15 EI Services
The WAL entries can be mapped to new set of tables via <tableMapping>.
<tableMapping> is a command separated list of targettables.
If specified, each table in <tables> must have a mapping.
Multi-point Division
When you create tables that are pre-divided by region in HBase, you may not
know the data distribution trend so the division by region may be inappropriate.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1217
Huawei Cloud Stack
Solution Description 15 EI Services
After the system runs for a period, regions need to be divided again to achieve
better performance. Only empty regions can be divided.
The region division function delivered with HBase divides regions only when they
reach the threshold. This is called "single point division".
Connection Limitation
Too many sessions mean that too many queries and MapReduce tasks are running
on HBase, which compromises HBase performance and even causes service
rejection. You can configure parameters to limit the maximum number of sessions
that can be established between the client and the HBase server to achieve HBase
overload protection.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1218
Huawei Cloud Stack
Solution Description 15 EI Services
3. In the open source version, HBase filters ACLs. Therefore, ACL information will
not be synchronized to the standby cluster. By adding a filter
(org.apache.hadoop.hbase.replication.SystemTableWALEntryFilterAllowAC
L), ACL information can be synchronized to the standby cluster. You can
configure hbase.replication.filter.sytemWALEntryFilter to enable the filter
and implement ACL synchronization.
4. As for read-only restriction of the standby cluster, only super users within the
standby cluster can modify the HBase of the standby cluster. In other words,
HBase clients outside the standby cluster can only read the HBase of the
standby cluster.
HBase MOB
In the actual application scenarios, data in various sizes needs to be stored, for
example, image data and documents. Data whose size is smaller than 10 MB can
be stored in HBase. HBase can yield the best read-and-write performance for data
whose size is smaller than 100 KB. If the size of data stored in HBase is greater
than 100 KB or even reaches 10 MB and the same number of data files are
inserted, the total data amount is large, causing frequent compaction and split,
high CPU consumption, high disk I/O frequency, and low performance.
MOB data (whose size ranges from 100 KB to 10 MB) is stored in a file system
(for example, HDFS) in HFile format. The expiredMobFileCleaner and Sweeper
tools are used to manage HFiles and save the address and size information about
the HFiles to the store of HBase as values. This significantly decreases the
compaction and split frequency in HBase and improves performance.
As shown in Figure 15-61, MOB indicates mobstore stored on HRegion. Mobstore
stores keys and values. Wherein, a key is the corresponding key in HBase, and a
value is the reference address and data offset stored in the file system. When
reading data, mobstore uses its own scanner to read key-value data objects and
uses the address and data size information in the value to obtain target data from
the file system.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1219
Huawei Cloud Stack
Solution Description 15 EI Services
HFS
HBase FileStream (HFS) is an independent HBase file storage module. It is used in
MRS upper-layer applications by encapsulating HBase and HDFS interfaces to
provide these upper-layer applications with functions such as file storage, read,
and deletion.
In the Hadoop ecosystem, the HDFS and HBase face tough problems in mass file
storage in some scenarios:
● If a large number of small files are stored in HDFS, the NameNode will be
under great pressure.
● Some large files cannot be directly stored on HBase due to HBase APIs and
internal mechanisms.
HFS is developed for the mixed storage of massive small files and some large files
in Hadoop. Simply speaking, massive small files (smaller than 10 MB) and some
large files (greater than 10 MB) need to be stored in HBase tables.
For such a scenario, HFS provides unified operation APIs similar to HBase function
APIs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1220
Huawei Cloud Stack
Solution Description 15 EI Services
HBase Dual-Read
In the HBase storage scenario, it is difficult to ensure 99.9% query stability due to
GC, network jitter, and bad sectors of disks. The HBase dual-read feature is added
to meet the requirements of low glitches during large-data-volume random read.
The HBase dual-read feature is based on the DR capability of the active and
standby clusters. The probability that the two clusters generate glitches at the
same time is far less than that of one cluster. The dual-cluster concurrent access
mode is used to ensure query stability. When a user initiates a query request, the
HBase service of the two clusters is queried at the same time. If the active cluster
does not return any result after a period of time (the maximum tolerable glitch
time), the data of the cluster with the fastest response can be used. The following
figure shows the working principle.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1221
Huawei Cloud Stack
Solution Description 15 EI Services
Writing Small Files Generated During WAL File Splitting to the HTTP
Archive (HAR) File
When a RegionServer is faulty or restarted, HMaster uses ServerCrashProcedure to
restore the services running on the RegionServer. The restoration process involves
splitting WAL files. During WAL file splitting, a large number of small files are
generated, which may cause HDFS performance bottlenecks. As a result, service
restoration takes a long time.
This feature writes small files to the HAR file during WAL file splitting to shorten
the RegionServer restoration duration.
For details about HAR, visit http://hadoop.apache.org/docs/stable/hadoop-
archives/HadoopArchives.html.
Batch TRSP
HBase 2.x uses HBase Procedure to rewrite the region assignment logic (AMV2).
When each region is opened or closed, a TransitRegionStateProcedure (TRSP) is
associated with it. When services running on a RegionServer need to be restored
due to RegionServer faults or restarts, HMaster creates a TRSP for each region to
be restored. A large number of TRSPs need to persist data to Proc WAL files and
perform an RPC interaction with RegionServer, which may cause HMaster
performance bottlenecks. As a result, the service restoration takes a long time.
This feature attaches regions to TRSPs and uses one TRSP to restore all regions of
a RegionServer. RegionServer batch opens or closes regions and reports all regions
to HMaster at a time.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1222
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
This feature can only restore regions to their original RegionServers. Therefore, the
prerequisite for this optimization to take effect is that the faulty or restarted RegionServer
has been brought online again when HMaster creates a TRSP. This feature is used to
optimize the duration for HBase restart or service fault restoration. If a few RegionServers
are faulty, this feature may not take effect because HMaster had created TRSPs before
RegionServers were brought online again.
15.1.5.14 HDFS
HDFS Architecture
HDFS consists of active and standby NameNodes and multiple DataNodes, as
shown in Figure 15-63.
HDFS works in master/slave architecture. NameNodes run on the master (active)
node, and DataNodes run on the slave (standby) node. ZKFC should run along
with the NameNodes.
The communication between NameNodes and DataNodes is based on
Transmission Control Protocol (TCP)/Internet Protocol (IP). The NameNode,
DataNode, ZKFC, and JournalNode can be deployed on Linux servers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1223
Huawei Cloud Stack
Solution Description 15 EI Services
Table 15-16 describes the functions of each module shown in Figure 15-63.
Modu Description
le
DataN A DataNode is used to store data blocks of each file and periodically
ode report the storage status to the NameNode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1224
Huawei Cloud Stack
Solution Description 15 EI Services
Modu Description
le
● HDFS HA Architecture
HA is used to resolve the SPOF problem of NameNode. This feature provides
a standby NameNode for the active NameNode. When the active NameNode
is faulty, the standby NameNode can quickly take over to continuously
provide services for external systems.
In a typical HDFS HA scenario, there are usually two NameNodes. One is in
the active state, and the other in the standby state.
A shared storage system is required to support metadata synchronization of
the active and standby NameNodes. This version provides Quorum Journal
Manager (QJM) HA solution, as shown in Figure 15-64. A group of
JournalNodes are used to synchronize metadata between the active and
standby NameNodes.
Generally, an odd number (2N+1) of JournalNodes are configured, and at
least three JournalNodes are required. For one metadata update message,
data writing is considered successful as long as data writing is successful on N
+1 JournalNodes. In this case, data writing failure of a maximum of N
JournalNodes is allowed. For example, when there are three JournalNodes,
data writing failure of one JournalNode is allowed; when there are five
JournalNodes, data writing failure of two JournalNodes is allowed.
JournalNode is a lightweight daemon process and shares a host with other
services of Hadoop. It is recommended that the JournalNode be deployed on
the control node to prevent data writing failure on the JournalNode during
massive data transmission.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1225
Huawei Cloud Stack
Solution Description 15 EI Services
HDFS Principles
MRS uses the HDFS copy mechanism to ensure data reliability. One backup file is
automatically generated for each file saved in HDFS, that is, two copies are
generated in total. The number of HDFS copies can be queried using the
dfs.replication parameter.
● When the Core node specification of the MRS cluster is set to non-local hard
disk drive (HDD) and the cluster has only one Core node, the default number
of HDFS copies is 1. If the number of Core nodes in the cluster is greater than
or equal to 2, the default number of HDFS copies is 2.
● When the Core node specification of the MRS cluster is set to local disk and
the cluster has only one Core node, the default number of HDFS copies is 1. If
there are two Core nodes in the cluster, the default number of HDFS copies is
2. If the number of Core nodes in the cluster is greater than or equal to 3, the
default number of HDFS copies is 3.
For details about the Hadoop architecture and principles, see https://
hadoop.apache.org/.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1226
Huawei Cloud Stack
Solution Description 15 EI Services
HDFS HA Background
In versions earlier than Hadoop 2.0.0, SPOF occurs in the HDFS cluster. Each
cluster has only one NameNode. If the host where the NameNode is located is
faulty, the HDFS cluster cannot be used unless the NameNode is restarted or
started on another host. This affects the overall availability of HDFS in the
following aspects:
1. In the case of an unplanned event such as host breakdown, the cluster would
be unavailable until the NameNode is restarted.
2. Planned maintenance tasks, such as software and hardware upgrade, will
cause the cluster stop working.
To solve the preceding problems, the HDFS HA solution enables a hot-swap
NameNode backup for NameNodes in a cluster in automatic or manual
(configurable) mode. When a machine fails (due to hardware failure), the active/
standby NameNode switches over automatically in a short time. When the active
NameNode needs to be maintained, the MRS cluster administrator can manually
perform an active/standby NameNode switchover to ensure cluster availability
during maintenance.
For details about HDFS automatic failover, see
https://hadoop.apache.org/docs/r3.3.1/hadoop-project-dist/hadoop-hdfs/
HDFSHighAvailabilityWithQJM.html#Automatic_Failover
HDFS HA Implementation
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1227
Huawei Cloud Stack
Solution Description 15 EI Services
it will store the modification log to a majority of these JournalNodes. For example,
if there are three JournalNodes, then the log will be saved on two of them at
least. The standby node monitors changes of JournalNodes and synchronizes
changes from the active node. Based on the modification log, the standby node
applies the changes to the metadata of the local file system. Once a switchover
occurs, the standby node can ensure its status is the same as that of the active
node. This ensures that the metadata of the file system is synchronized between
the active and standby nodes if the switchover is incurred by the failure of the
active node.
To ensure fast switchover, the standby node needs to have the latest block
information. Therefore, DataNodes send block information and heartbeat
messages to two NameNodes at the same time.
It is vital for an HA cluster that only one of the NameNodes be active at any time.
Otherwise, the namespace state would split into two parts, risking data loss or
other incorrect results. To prevent the so-called "split-brain scenario", the
JournalNodes will only ever allow a single NameNode to write data to it at a time.
During switchover, the NameNode which is to become active will take over the
role of writing data to JournalNodes. This effectively prevents the other
NameNodes from being in the active state, allowing the new active node to safely
proceed with switchover.
For more information about the HDFS HA solution, visit the following website:
https://hadoop.apache.org/docs/r3.3.1/hadoop-project-dist/hadoop-hdfs/
HDFSHighAvailabilityWithQJM.html
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1228
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1229
Huawei Cloud Stack
Solution Description 15 EI Services
3. Executor runs these tasks, and writes the computed RDD data to the directory
created in 1.
1. The ZKFC connects to ZooKeeper and saves information such as host names
to ZooKeeper under the znode directory /hadoop-ha. NameNode that creates
the directory first is considered as the active node, and the other is the
standby node. NameNodes read the NameNode information periodically
through ZooKeeper.
2. When the process of the active node ends abnormally, the standby
NameNode detects changes in the /hadoop-ha directory through ZooKeeper,
and then takes over the service of the active NameNode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1230
Huawei Cloud Stack
Solution Description 15 EI Services
1. The Map task processes the records in the two table files into Join Key and
Value, performs hash partitioning by Join Key, and sends the data to different
Reduce tasks for processing.
2. Reduce tasks read data in the left table recursively in the nested loop mode
and traverse each line of the right table. If join key values are identical, join
results are output.
The preceding method sharply reduces the performance of the join
calculation. Because a large amount of network data transfer is required
when the data stored in different nodes is sent from MAP to Reduce, as
shown in Figure 15-70.
Data tables are stored in physical file system by HDFS block. Therefore, if two to-
be-joined blocks are put into the same host accordingly after they are partitioned
by join key, you can obtain the results directly from Map join in the local node
without any data transfer in the Reduce process of the join calculation. This will
greatly improve the performance.
With the identical distribution feature of HDFS data, a same distribution ID is
allocated to files, FileA and FileB, on which association and summation
calculations need to be performed. In this way, all the blocks are distributed
together, and calculation can be performed without retrieving data across nodes,
which greatly improves the MapReduce join performance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1231
Huawei Cloud Stack
Solution Description 15 EI Services
For example, three data storage volumes are mounted to a DataNode, and
dfs.datanode.failed.volumes.tolerated is set to 1. In this case, if one data storage
volume of the DataNode is unavailable, this DataNode can still provide services, as
shown in Figure 15-73.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1232
Huawei Cloud Stack
Solution Description 15 EI Services
This native configuration item has some defects. When the number of data
storage volumes in each DataNode is inconsistent, you need to configure each
DataNode independently instead of generating the unified configuration file for all
nodes.
Assume that there are three DataNodes in a cluster. The first node has three data
directories, the second node has four, and the third node has five. If you want to
ensure that DataNode services are available when only one data directory is
available, you need to perform the configuration as shown in Figure 15-74.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1233
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1234
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1235
Huawei Cloud Stack
Solution Description 15 EI Services
are also sorted by their I/O load. The DataNodes with heavy load are at the
bottom of the list.
However, low latency disks are far more expensive than spinning disks. Data
typically sees heavy initial usage with decline in usage over a period of time.
Therefore, it can be useful if data that is no longer used is moved out from
expensive disks to cheaper ones storage media.
A typical example is storage of detail records. New detail records are imported
into SSD because they are frequently queried by upper-layer applications. As
access frequency to these detail records declines, they are moved to cheaper
storage.
Before automatic data movement is achieved, you have to manually determine by
service type whether data is frequently used, manually set a data storage policy,
and manually trigger the HDFS Auto Data Movement Tool, as shown in the figure
below.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1236
Huawei Cloud Stack
Solution Description 15 EI Services
If aged data can be automatically identified and moved to cheaper storage (such
as disk/archive), you will see significant cost cuts and data management efficiency
improvement.
The HDFS Auto Data Movement Tool is at the core of HDFS Auto Data Movement.
It automatically sets a storage policy depending on how frequently data is used.
Specifically, functions of the HDFS Auto Data Movement Tool can:
● Mark a data storage policy as All_SSD, One_SSD, Hot, Warm, Cold, or
FROZEN according to age, access time, and manual data movement rules.
● Define rules for distinguishing cold and hot data based on the data age,
access time, and manual migration rules.
● Define the action to be taken if age-based rules are met.
MARK: the action for identifying whether data is frequently or rarely used
based on the age rules and setting a data storage policy. MOVE: the action
for invoking the HDFS Auto Data Movement Tool and moving data based on
the age rules to identify whether data is frequently or rarely used after you
have determined the corresponding storage policy.
– MARK: identifies whether data is frequently or rarely used and sets the
data storage policy.
– MOVE: the action for invoking the HDFS Auto Data Movement Tool and
moving data across tiers.
– SET_REPL: the action for setting new replica quantity for a file.
– MOVE_TO_FOLDER: the action for moving files to a target folder.
– DELETE: the action for deleting a file or directory.
– SET_NODE_LABEL: the action for setting node labels of a file.
With the HDFS Auto Data Movement feature, you only need to define age based
on access time rules. HDFS Auto Data Movement Tool matches data according to
age-based rules, sets storage policies, and moves data. In this way, data
management efficiency and cluster resource efficiency are improved.
15.1.5.15 HetuEngine
HetuEngine Description
HetuEngine is a self-developed high-performance, interactive SQL analysis and
data virtualization engine. It seamlessly integrates with the big data ecosystem to
implement interactive query of massive amounts of data within seconds, and
supports cross-source and cross-domain unified data access to enable one-stop
SQL convergence analysis in the data lake, between lakes, and between
lakehouses.
HetuEngine Architecture
HetuEngine consists of different modules. Figure 15-77 shows the structure of
HetuEngine. Table 15-17 describes the basic concepts of HetuEngine.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1237
Huawei Cloud Stack
Solution Description 15 EI Services
Mo Concept Description
dul
e
Clo HetuEngine CLI/ HetuEngine client, through which query requests are
ud JDBC submitted and results are returned and displayed.
ser
vice HSBroker Service management component of HetuEngine. It
lay manages and verifies compute instances, monitors
er health status, and performs automatic maintenance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1238
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1239
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.16 Hive
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1240
Huawei Cloud Stack
Solution Description 15 EI Services
and semi-structured data for data calculation. Hive operates structured data using
Hive Query Language (HQL), a SQL-like language. HQL is automatically converted
into MapReduce tasks for the query and analysis of massive data in the Hadoop
cluster. For more information about Hive tables, see the Hive tutorial of the open
source community.
Hive provides the following functions:
● Analyzes massive structured data and summarizes analysis results.
● Allows complex MapReduce jobs to be compiled in SQL languages.
● Supports flexible data storage formats, including JavaScript object notation
(JSON), comma separated values (CSV), TextFile, RCFile, SequenceFile, and
ORC (Optimized Row Columnar).
Hive Architecture
Hive is a single-instance service process that provides services by translating HQL
into related MapReduce jobs or HDFS operations. Figure 15-80 shows how Hive is
connected to other components.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1241
Huawei Cloud Stack
Solution Description 15 EI Services
Module Description
HCatalog is built on Hive Metastore and incorporates the DDL capability of Hive.
HCatalog is also a Hadoop-based table and storage management layer that
enables convenient data read/write on tables of HDFS by using different data
processing tools such as Pig and MapReduce. Besides, HCatalog also provides
read/write APIs for these tools and uses a Hive CLI to publish commands for
defining data and querying metadata. After encapsulating these commands,
WebHCat Server can provide RESTful APIs, as shown in Figure 15-81.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1242
Huawei Cloud Stack
Solution Description 15 EI Services
Principles
Hive functions as a data warehouse based on HDFS and MapReduce architecture
and translates HQL statements into MapReduce jobs or HDFS operations. For
details about Hive and HQL, see HiveQL Language Manual.
Figure 15-82 shows the Hive structure.
● Metastore: reads, writes, and updates metadata such as tables, columns, and
partitions. Its lower layer is relational databases.
● Driver: manages the lifecycle of HiveQL execution and participates in the
entire Hive job execution.
● Compiler: translates HQL statements into a series of interdependent Map or
Reduce jobs.
● Optimizer: is classified into logical optimizer and physical optimizer to
optimize HQL execution plans and MapReduce jobs, respectively.
● Executor: runs Map or Reduce jobs based on job dependencies.
● ThriftServer: functions as the servers of JDBC, provides Thrift APIs, and
integrates with Hive and other applications.
● Clients: include the WebUI and JDBC APIs and provides APIs for user access.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1243
Huawei Cloud Stack
Solution Description 15 EI Services
Hive uses open-source component Apache Calcite to implement the CBO. SQL
statements are first converted into Hive Abstract Syntax Trees (ASTs) and then
into RelNodes that can be identified by Calcite. After Calcite adjusts the join
sequence in RelNodes, RelNodes are converted into ASTs by Hive to continue the
logical and physical optimization. Figure 15-83 shows the working flow.
The estimated number of queried data entries is: 1,000,000 x 1/50 = 20,000. The
selection rate is 2%.
The following takes the TPC-DS Q3 as an example to describe how the CBO
adjusts the join sequence:
select
dt.d_year,
item.i_brand_id brand_id,
item.i_brand brand,
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1244
Huawei Cloud Stack
Solution Description 15 EI Services
sum(ss_ext_sales_price) sum_agg
from
date_dim dt,
store_sales,
item
where
dt.d_date_sk = store_sales.ss_sold_date_sk
and store_sales.ss_item_sk = item.i_item_sk
and item.i_manufact_id = 436
and dt.d_moy = 12
group by dt.d_year , item.i_brand , item.i_brand_id
order by dt.d_year , sum_agg desc , brand_id
limit 10;
Statement explanation: This statement indicates that inner join is performed for
three tables: table store_sales is a fact table with about 2,900,000,000 data
entries, table date_dim is a dimension table with about 73,000 data entries, and
table item is a dimension table with about 18,000 data entries. Each table has
filtering conditions. Figure 15-84 shows the join relationship.
The CBO must first select the tables that bring the best filtering effect for joining.
By analyzing min, max, NDV, and the number of data entries, the CBO estimates
the selection rates of different dimension tables, as shown in Table 15-20.
The selection rate can be estimated as follows: Selection rate = Number of data
entries after filtering/Number of original data entries
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1245
Huawei Cloud Stack
Solution Description 15 EI Services
As shown in the preceding table, the item table has a better filtering effect.
Therefore, the CBO joins the item table first before joining the date_dim table.
Figure 15-85 shows the join process when the CBO is disabled.
Figure 15-86 shows the join process when the CBO is enabled.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1246
Huawei Cloud Stack
Solution Description 15 EI Services
After the CBO is enabled, the number of intermediate data entries is reduced from
495,000,000 to 2,900,000 and thus the execution time can be remarkably reduced.
HDFS
Hive is a sub-project of Apache Hadoop, which uses HDFS as the file storage
system. It parses and processes structured data with highly reliable underlying
storage supported by HDFS. All data files in the Hive database are stored in HDFS,
and all data operations on Hive are also performed using HDFS APIs.
MapReduce
Hive data computing depends on MapReduce. MapReduce is also a sub-project of
Apache Hadoop and is a parallel computing framework based on HDFS. During
data analysis, Hive parses HQL statements submitted by users into MapReduce
tasks and submits the tasks for MapReduce to execute.
Tez
Tez, an open-source project of Apache, is a distributed computing framework that
supports directed acyclic graphs (DAGs). When Hive uses the Tez engine to
analyze data, it parses HQL statements submitted by users into Tez tasks and
submits the tasks to Tez for execution.
DBService
MetaStore (metadata service) of Hive processes the structure and attribute
information of Hive metadata, such as Hive databases, tables, and partitions. The
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1247
Huawei Cloud Stack
Solution Description 15 EI Services
Elasticsearch
Hive uses Elasticsearch as its extended file storage system. Hive integrates the
Elasticsearch-Hadoop plug-in of Elasticsearch, creates a foreign table, and stores
table data in Elasticsearch so that Hive can read and write Elasticsearch index
data.
Spark
Spark can be used as the execution engine of Hive. Hive SQL statements delivered
by the client are processed at the logical layer on Hive, and physical execution
plans are generated and converted into a directed acyclic graph (DAG) of a
resilient distributed dataset (RDD), and then submitted to a Spark cluster as a
task. This way, Hive query efficiency is improved thanks to the distributed memory
computing capability of Spark.
Hive supports HDFS Colocation. When Hive tables are created, after the locator
information is set for table files, the data files of related tables are stored on the
same storage node. This ensures convenient and efficient data computing among
associated tables.
The Hive column encryption mechanism supports two encryption algorithms that
can be selected to meet site requirements during table creation:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1248
Huawei Cloud Stack
Solution Description 15 EI Services
solution supports the ability to delete a single piece of HBase table data. Using a
specific syntax, Hive can delete one or more pieces of data from an HBase table.
However, some data files are delimited by special characters, and not a carriage
return character.
MRS Hive supports the HTTPS protocol that is more secure, and enables
switchover between the HTTP protocol and the HTTPS protocol.
Users can modify configurations of the Transform function to enable the function.
However, security risks exist when the Transform function is enabled.
You can modify configurations of this function. After the function is enabled, you
can create temporary functions without ADMIN permission.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1249
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.17 Hudi
Hudi is a data lake table format that provides the ability to update and delete
data as well as consume new data on HDFS. It supports multiple compute engines
and provides insert, update, and delete (IUD) interfaces and streaming primitives,
including upsert and incremental pull, over datasets on HDFS.
NOTE
To use Hudi, ensure that the Spark service has been installed in the MRS cluster.
Features
● The ACID transaction capability supports real-time data import to the lake
and batch data import to the data lake.
● Multiple view capabilities (read-optimized view/incremental view/real-time
view) enable quick data analysis.
● Multi-version concurrency control (MVCC) design supports data version
backtracking.
● Automatic management of file sizes and layouts optimizes query performance
and provides quasi-real-time data for queries.
● Concurrent read and write are supported. Data can be read when being
written based on snapshot isolation.
● Bootstrapping is supported to convert existing tables into Hudi datasets.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1250
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1251
Huawei Cloud Stack
Solution Description 15 EI Services
MOR tables, and the data in log files is ignored. The data provided by this
view may not be the latest. However, once the compact operation is
performed on MOR tables, the incremental log data is merged into the base
data. In this case, this view has the same capability as the real-time view.
15.1.5.18 Hue
If Internet Explorer is used to access the Hue page to execute HiveSQL statements,
the execution fails, because the browser has functional problems. You are advised to
use a compatible browser, for example, Google Chrome.
● MapReduce: Check MapReduce tasks that are being executed or have been
finished in the clusters, including their status, start and end time, and run
logs.
● Oozie: Hue provides the Oozie job manager function, in this case, you can use
Oozie in GUI mode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1252
Huawei Cloud Stack
Solution Description 15 EI Services
Hue Architecture
Hue, adopting the MTV (Model-Template-View) design, is a web application
program running on Django Python. (Django Python is a web application
framework that uses open source codes.)
Hue consists of Supervisor Process and WebServer. Supervisor Process is the core
Hue process that manages application processes. Supervisor Process and
WebServer interact with applications on WebServer through Thrift/REST APIs, as
shown in Figure 15-88.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1253
Huawei Cloud Stack
Solution Description 15 EI Services
Connection Description
Name
Hue WebServer Provides the following functions through the Django Python
web framework:
● Deploys applications.
● Provides the GUI.
● Connects to databases to store persistent data of
applications.
Connection Description
Name
HDFS HDFS provides REST APIs to interact with Hue to query and
operate HDFS files.
Hue packages a user request into interface data, sends the
request to HDFS through REST APIs, and displays execution
results on the web UI.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1254
Huawei Cloud Stack
Solution Description 15 EI Services
Connection Description
Name
Solr Solr provides REST APIs to interact with Hue, define indexes,
and search information.
In the Hue web UI, screening parameters are set using GUI
controls. The parameter settings are sent to the Hue server.
The Hue server invokes the REST APIs of Solr and transmits
the results returned by Solr in JSON format to the Hue web
UI. The Hue web UI then displays the results using icons
and controls.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1255
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.19 IoTDB
IoTDB sorts time series and stores indexes and chunks, greatly improving the
query performance of time series data. IoTDB uses the Raft protocol to ensure
data consistency. In time series scenarios, IoTDB pre-computes and stores data to
improve analysis performance. Based on the characteristics of time series data,
IoTDB provides powerful data encoding and compression capabilities. In addition,
its replica mechanism ensures data security. IoTDB is deeply integrated with
Apache Hadoop and Flink to meet the requirements of massive data storage,
high-speed data reading, and complex data analysis in the industrial IoT field.
IoTDB Architecture
The IoTDB suite consists of multiple components to provide a series of functions
such as data collection, data writing, data storage, data query, data visualization,
and data analysis.
Figure 15-90 shows the overall application architecture after all components of
the IoTDB suite are used. IoTDB refers to the time series database component in
the suite.
● Users can use Java Database Connectivity (JDBC) or Session to import the
time series data and system status data (such as server load, CPU usage and
memory usage) collected from device sensors, as well as time series data in
message queues, applications, or other databases, to the local or remote
IoTDB. Users can also directly write the preceding data into a local TsFile file
or a TsFile file in the HDFS.
● Users can write TsFile files to the HDFS to implement data processing tasks
such as exception detection and machine learning on the Hadoop or Flink
data processing platform.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1256
Huawei Cloud Stack
Solution Description 15 EI Services
The IoTDB service includes two roles: IoTDBServer (DataNode) and ConfigNode.
The role name DataNode of the community edition has the same name as the
HDFS role. DataNode is renamed IoTDBServer.
● ConfigNode: management role, which is responsible for DataNode data
sharding and load balancing.
● IoTDBServer (DataNode): storage role, which is responsible for storing,
querying, and writing data.
IoTDB Principles
Based on the attribute hierarchy, attribute coverage, and subordinate relationships
between data, the IoTDB data model can be represented as the attribute
hierarchy, as shown in Figure 15-92. The hierarchy is as follows: power group layer
- power plant layer - device layer - sensor layer. ROOT is a root node, and each
node at the sensor layer is a leaf node. According to the IoTDB syntax, the path
from ROOT to a leaf node is separated by a dot (.). The complete path is used to
name a time series in the IoTDB. For example, the time series name corresponding
to the path on the left in the following figure is ROOT.ln.wf01.wt01.status.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1257
Huawei Cloud Stack
Solution Description 15 EI Services
Visualization
● Visualized O&M covers installation, uninstallation, one-click start and stop,
configurations, clients, monitoring, alarms, health checks, and logs.
● Visualized permission management does not require background command
line operations and supports read and write permission control at the
database and table levels.
● Visualized log level configuration dynamically takes effect, supports visualized
download and retrieval, and supports log audit.
Security Hardening
User authentication supports Kerberos authentication and SSL encryption, which
are compatible with the community authentication mode.
Ecosystem Interconnection
On the basis of native capabilities, the cluster interconnection with MQTT is
enhanced.
Enterprise-Level Features
In addition to native capabilities, disk hot swap, backup, and restoration
capabilities are enhanced.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1258
Huawei Cloud Stack
Solution Description 15 EI Services
Lakehouse
Supports cross-source federation. HetuEngine can be used with HBase and Hive
for converged analysis and query, eliminating the need for data transfer.
15.1.5.20 JobGateway
JobGateway Architecture
JobGateway consists of JobServer and JobBalancer instances.
● JobBalancer provides load balancing.
● JobServer provides REST APIs for submitting jobs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1259
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.21 Kafka
Kafka Architecture
Producers publish data to topics, and consumers subscribe to the topics and
consume messages. A broker is a server in a Kafka cluster. For each topic, the
Kafka cluster maintains partitions for scalability, parallelism, and fault tolerance.
Each partition is an ordered, immutable sequence of messages that is continually
appended to - a commit log. Each message in a partition is assigned a sequential
ID, which is called offset.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1260
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1261
Huawei Cloud Stack
Solution Description 15 EI Services
Consumers label themselves with a consumer group name, and each message
published to a topic is delivered to one consumer instance within each subscribing
consumer group. If all the consumer instances belong to the same consumer
group, loads are evenly distributed among the consumers. As shown in the
preceding figure, Consumer1 and Consumer2 work in load-sharing mode;
Consumer3, Consumer4, Consumer5, and Consumer6 work in load-sharing mode.
If all the consumer instances belong to different consumer groups, messages are
broadcast to all consumers. As shown in the preceding figure, the messages in
Topic 1 are broadcast to all consumers in Consumer Group1 and Consumer
Group2.
Kafka Principles
● Message Reliability
When a Kafka broker receives a message, it stores the message on a disk
persistently. Each partition of a topic has multiple replicas stored on different
broker nodes. If one node is faulty, the replicas on other nodes can be used.
● High Throughput
Kafka provides high throughput in the following ways:
– Messages are written into disks instead of being cached in the memory,
fully utilizing the sequential read and write performance of disks.
– The use of zero-copy eliminates I/O operations.
– Data is sent in batches, improving network utilization.
– Each topic is divided in to multiple partitions, which increases concurrent
processing. Concurrent read and write operations can be performed
between multiple producers and consumers. Producers send messages to
specified partitions based on the algorithm used.
● Message Subscribe-Notify Mechanism
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1262
Huawei Cloud Stack
Solution Description 15 EI Services
Kafka UI
Kafka UI provides Kafka web services, displays basic information about functional
modules such as brokers, topics, partitions, and consumers in a Kafka cluster, and
provides operation entries for common Kafka commands. Kafka UI replaces Kafka
Manager to provide secure Kafka web services that comply with security
specifications.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1263
Huawei Cloud Stack
Solution Description 15 EI Services
MirrorMaker
MirrorMaker is a tool for implementing data synchronization between active and
standby Kafka clusters. It consumes data from the active Kafka cluster and backs
up the data to the standby cluster so that a data replica of the active Kafka cluster
can be generated.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1264
Huawei Cloud Stack
Solution Description 15 EI Services
● Queries the mapping between broker IDs and node IP addresses. On Linux
clients, kafka-broker-info.sh can be used to query the mapping between
broker IDs and node IP addresses.
15.1.5.22 KMS
NOTE
Overview
To manage the access control permissions on data and resources in a cluster, it is
recommended that the cluster be installed in security mode. In security mode, a
client application must be authenticated and a secure session must be established
before the application accesses any resource in the cluster. MRS uses KrbServer to
provide Kerberos authentication for all components, implementing a reliable
authentication mechanism.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1265
Huawei Cloud Stack
Solution Description 15 EI Services
Architecture
The security authentication function for user login depends on Kerberos and LDAP.
Connection Description
Name
Manager WS WebBrowser
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1266
Huawei Cloud Stack
Solution Description 15 EI Services
Data operation mode of Kerberos1 in LDAP: The active and standby instances of
LDAP1 and the two standby instances of LDAP2 can be accessed in load balancing
mode. Data write operations can be performed only in the active LDAP1 instance.
Data read operations can be performed in LDAP1 or LDAP2.
Data operation mode of Kerberos2 in LDAP: Data read operations can be
performed in LDAP1 and LDAP2. Data write operations can be performed only in
the active LDAP1 instance.
Principle
Kerberos authentication
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1267
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1268
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.24 Loader
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1269
Huawei Cloud Stack
Solution Description 15 EI Services
Table 15-25 describes the functions of each module shown in the preceding
figure.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1270
Huawei Cloud Stack
Solution Description 15 EI Services
Module Description
Loader imports or exports jobs in parallel using MapReduce jobs. Some job import
or export may involve only the Map operations, while some may involve both Map
and Reduce operations.
For details about the Loader architecture and principles, see https://
sqoop.apache.org/docs/1.99.3/index.html.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1271
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1272
Huawei Cloud Stack
Solution Description 15 EI Services
● Supports file coding format conversion during file import and export. The
supported coding formats include all formats supported by Java Development
Kit (JDK).
● Retains the original directory structure and file names during file import and
export.
● Supports file combination during file import and export. For example, if a
large number of files are to be imported, these files can be combined into n
files (n can be configured).
● Supports file filtering during file import and export. The filtering rules support
wildcards and regular expressions.
● Supports batch import and export of ETL tasks.
● Supports query by page and key word and group management of ETL tasks.
● Provides floating IP addresses for external components.
15.1.5.25 Manager
Overview
Manager is the O&M management system of MRS and provides unified cluster
management capabilities for services deployed in clusters.
Architecture
Figure 15-104 shows the overall logical architecture of FusionInsight Manager.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1273
Huawei Cloud Stack
Solution Description 15 EI Services
● OMS: serves as management node in the O&M system. There are two OMS
nodes deployed in active/standby mode.
● OMA: managed node in the O&M system. Generally, there are multiple OMA
nodes.
Table 15-26 describes the modules shown in Figure 15-104.
Web Service A web service deployed under Tomcat, providing HTTPS API of
Manager. It is used to access Manager through the web browser.
In addition, it provides the northbound access capability based
on the Syslog and SNMP protocols.
OMS Management node of the O&M system. Generally, there are two
OMS nodes that work in active/standby mode.
OMA Managed node in the O&M system. Generally, there are multiple
OMA nodes.
Node Agent Node Agent exists on each cluster node and is an enabler of
Manager on a single node.
● Node Agent represents all the components deployed on the
node to interact with Controller, implementing convergence
from multiple nodes of a cluster to a single node.
● Node Agent enables Controller to perform all operations on
the components deployed on the node. It allows Controller
functions to be implemented.
Node Agent sends heartbeat messages to Controller at an
interval of 3 seconds. The interval cannot be configured.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1274
Huawei Cloud Stack
Solution Description 15 EI Services
Module Description
OMM Agent Agent for performance monitoring and alarm reporting on the
OMA. It collects performance monitoring data and alarm data
on Agent Node.
NTP Server It synchronizes the system clock of each node in the cluster.
NTP Client
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1275
Huawei Cloud Stack
Solution Description 15 EI Services
Manager introduces the concept of role and uses role-based access control (RBAC)
to manage system permissions. It centrally displays and manages scattered
permission functions of each component in the system and organizes the
permissions of each component in the form of permission sets (roles) to form a
unified system permission concept. By doing so, common users cannot obtain
internal permission management details, and permissions become easy for MRS
cluster administrators to manage, greatly facilitating permission management and
improving user experience.
This function centrally manages and authenticates Manager users and component
users. The entire system uses LDAP to manage users and uses Kerberos for
authentication. A set of Kerberos and LDAP management mechanisms are used
between the OMS and components. SSO (including single sign-on and single sign-
out) is implemented through CAS. With SSO, users can easily switch tasks between
the Manager web UI, component web UIs, and third-party systems, without
switching to another user.
NOTE
● To ensure security, the CAS Server can retain a ticket-granting ticket (TGT) used by a user
only for 20 minutes.
● If a user does not perform any operation on the page (including on the Manager web UI and
component web UIs) within 20 minutes, the page is automatically locked.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1276
Huawei Cloud Stack
Solution Description 15 EI Services
● The computing resources indicate tenants' Yarn task queue resources. The
task queue quota can be modified, and the task queue usage status and
statistics can be viewed.
● The storage resources can be stored on HDFS. You can add and delete the
HDFS storage directories of tenants, and set the quotas of file quantity and
the storage space of the directories.
Manager also provides the multi-instance function so that users can use the
HBase, Hive, or Spark alone in the resource control and service isolation scenario.
The multi-instance function is disabled by default and can be manually enabled.
15.1.5.26 MapReduce
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1277
Huawei Cloud Stack
Solution Description 15 EI Services
MapReduce Architecture
As shown in Figure 15-106, MapReduce is integrated into YARN through the
Client and ApplicationMaster interfaces of YARN, and uses YARN to apply for
computing resources.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1278
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1279
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1280
Huawei Cloud Stack
Solution Description 15 EI Services
The Reduce process is divided into three different steps: Copy, Sort (actually
supposed to be called Merge), and Reduce. In Copy phase, Reducer tries to fetch
the output of Maps from NodeManagers and store it on Reducer either in memory
or on disk. Shuffle (Sort and Merge) phase then begins. All the fetched map
outputs are being sorted, and segments from different map outputs are merged
before being sent to Reducer. When a job has a large number of maps to be
processed, the shuffle process is time-consuming. For specific tasks (for example,
SQL tasks such as hash join and hash aggregation), sorting is not mandatory
during the shuffle process. However, the sorting is required by default in the
shuffle process.
This feature is enhanced by using the MapReduce API, which can automatically
close the Sort process for such tasks. When the sorting is disabled, the API directly
merges the fetched Maps output data and sends the data to Reducer. This greatly
saves time, and significantly improves the efficiency of SQL tasks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1281
Huawei Cloud Stack
Solution Description 15 EI Services
Enhanced Open Source Feature: Small Log File Problem Solved After
Optimization of MR History Server
After the job running on Yarn is executed, NodeManager uses
LogAggregationService to collect and send generated logs to HDFS and deletes
them from the local file system. After the logs are stored to HDFS, they are
managed by MR HistoryServer. LogAggregationService will merge local logs
generated by containers to a log file and upload it to the HDFS, reducing the
number of log files to some extent. However, in a large-scale and busy cluster,
there will be excessive log files on HDFS after long-term running.
For example, if there are 20 nodes, about 18 million log files are generated within
the default clean-up period (15 days), which occupy about 18 GB of the memory
of a NameNode and slow down the HDFS system response.
Only the reading and deletion are required for files stored on HDFS. Therefore,
Hadoop Archives can be used to periodically archive the directory of collected log
files.
Archiving Logs
The AggregatedLogArchiveService module is added to MR HistoryServer to
periodically check the number of files in the log directory. When the number of
files reaches the threshold, AggregatedLogArchiveService starts an archiving task
to archive log files. After archiving, it deletes the original log files to reduce log
files on HDFS.
Cleaning Archived Logs
Hadoop Archives does not support deletion in archived files. Therefore, the entire
archive log package must be deleted upon log clean-up. The latest log generation
time is obtained by modifying the AggregatedLogDeletionService module. If all log
files meet the clean-up requirements, the archive log package can be deleted.
Browsing Archived Logs
Hadoop Archives allows URI-based access to file content in the archive log
package. Therefore, if MR History Server detects that the original log files do not
exist during file browsing, it directly redirects the URI to the archive log package to
access the archived log file.
NOTE
● This function invokes Hadoop Archives of HDFS for log archiving. Because the execution
of an archiving task by Hadoop Archives is to run an MR application. Therefore, after an
archiving task is executed, an MR execution record is added.
● This function of archiving logs is based on the log collection function. Therefore, this
function is valid only when the log collection function is enabled.
15.1.5.27 Metadata
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1282
Huawei Cloud Stack
Solution Description 15 EI Services
Introduction to Metadata
Metadata Management (MDM) provides metadata extraction capabilities for MRS
data warehouse components (Hive and HBase), and allows users to label each
metadata for data analysis, search, and other extended functions.
Metadata Principles
MDM extracts metadata from Hive and HBase in the MRS system and dumps the
metadata. By using the MRS framework installation process, MDM obtains the
Hive and HBase connection mode and valid access authentication, and finally
obtains the metadata from the Hive and HBase databases.
1. MDM obtains the Hadoop cluster basic information from Manager. The basic
information includes HBase RegionServer node deployment information and
information about DBService that saves Hive metadata.
2. According to the information obtained by 1, MDM extracts metadata from
Hive and HBase and saves the metadata in DBService. You can log in to the
FusionInsight Manager system from a client and view the metadata.
3. Upload the extracted metadata to a third-party metadata management
system by using an external FTP server. The uploaded metadata can be used
to support higher-level metadata management.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1283
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.28 MOTService
Overview
MOTService is an in-memory table engine developed based on GaussDB(for
openGauss). It features high throughput and low latency, and further improves
performance based on the high-performance, high-security, and high-reliability
enterprise-level relational database capabilities of GaussDB(for openGauss). It
supports transactions and complete transaction ACID features. In FusionInsight
RTD, MOTService provides data storage, rule calculation, and data query services
for RTDService.
Principles
MOTService is an in-memory table engine developed based on GaussDB(for
openGauss). It is essentially an OLTP standalone database. It optimizes execution,
precompilation of stored procedures, and optimistic locking of MVCC, and achieves
millisecond-level latency and thousand-level TPS in RTDService's rule calculation.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1284
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1285
Huawei Cloud Stack
Solution Description 15 EI Services
Lock-Free Index
The data and indexes of memory tables are stored in the memory. Therefore, it is
important to have an efficient index data structure and algorithm. The
MOTService index mechanism is based on the state-of-the-art Masstree, which is a
fast and scalable Key Value (KV) storage index for multi-core systems and is
implemented using the Trie of the B+ tree. In this way, excellent performance on
multi-core servers can be achieved in the case of high-concurrency workloads.
Masstree is a combination of tries and a B+ tree that is implemented to carefully
exploit caching, prefetching, optimistic navigation, and fine-grained locking.
However, the downside of a Masstree index is its higher memory consumption.
MOTService's main innovation was to enhance the original Masstree data
structure and algorithm, which did not support non-unique indexes. Another
improvement is Arm architecture support.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1286
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1287
Huawei Cloud Stack
Solution Description 15 EI Services
MOTService Active/Standby HA
MOTService uses the HA module of Manager for automatic active/standby
switchover. The active HA process checks whether the active MOTService process
on the same node is normal every 30 seconds.
Both active and standby Nginx instances are configured to listen to the same
floating IP address. Service applications can access MOTService through the Nginx
route by connecting to the floating IP address. Therefore, the active/standby
switchover of Nginx and MOTService is transparent to the interfaces used by
service applications.
15.1.5.29 Oozie
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1288
Huawei Cloud Stack
Solution Description 15 EI Services
Introduction to Oozie
Oozie is an open-source workflow engine that is used to schedule and coordinate
Hadoop jobs.
Architecture
The Oozie engine is a web application integrated into Tomcat by default. Oozie
uses PostgreSQL databases.
Oozie provides an Ext-based web console, through which users can view and
monitor Oozie workflows. Oozie provides an external REST web service API for the
Oozie client to control workflows (such as starting and stopping operations), and
orchestrate and run Hadoop MapReduce tasks. For details, see Figure 15-115.
Table 15-27 describes the functions of each module shown in Figure 15-115.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1289
Huawei Cloud Stack
Solution Description 15 EI Services
Connection Description
Name
Principle
Oozie is a workflow engine server that runs MapReduce workflows. It is also a
Java web application running in a Tomcat container.
Supports single sign-on and sign-out, HTTPS access, and audit logs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1290
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.30 Ranger
Ranger Principles
● Ranger Plugins
Ranger provides policy-based access control (PBAC) plug-ins to replace the
original authentication plug-ins of the components. Ranger plug-ins are
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1291
Huawei Cloud Stack
Solution Description 15 EI Services
RangerKMS Principles
RangerKMS manages authentication keys based on HadoopKMS. Symmetric AES
encryption algorithms are used to provide a C/S interaction model that uses REST
APIs for HTTP communications. KMS and its clients are secure and support HTTP
SPNEGO Kerberos authentication and HTTPS. RangerKMS is a Tomcat web
application. RangerKMS outperforms HadoopKMS with the following features:
● Key storage: RangerKMS keys can be stored in databases or HSMs. The keys
remain consistent when caching is disabled.
● ACL control: RangerAdmin is used for fine-grained and key permission
management.
● Third-party HSMs: RangerKMS can interconnect with Huawei Cloud DEW.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1292
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.31 Redis
Introduction to Redis
Redis is an open-source, network-based, and high-performance key-value
database. It makes up for the shortage of memcached key-value storage. In some
scenarios, Redis can be used as a supplement to relational databases to meet real-
time and high-concurrency requirements.
Redis is similar to Memcached. Besides, it supports data persistence and diverse
data types. Redis also supports the calculation of the union, intersection, and
complement of sets on the server as well as multiple sorting functions.
NOTE
The network data transmission between the Redis client and server is not encrypted, which
brings security risks. Therefore, It is advised not to use Redis to store sensitive data.
Redis Architecture
Redis consists of Redis Server and Redis-WS, as shown in Figure 15-118.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1293
Huawei Cloud Stack
Solution Description 15 EI Services
● Redis Server: core module of the Redis. It is responsible for data read and
write of the Redis protocol, active/standby replication, and maintain the data
persistence and cluster functions.
● Redis-WS: Redis WebService management module. It implements operations
such as cluster creation/deletion, scaling-out/scaling-in, and cluster querying,
and stores cluster management information in the DB.
Redis Principles
Redis persistence
Redis supports AOF and RDB persistence at the same time. When Redis restarts, it
preferentially uses AOF to restore data sets because the AOF contains more
complete data sets than the RDB. The data persistence function can also be
disabled. When it is disabled, data exists only when the server is running.
Redis instances can be deployed on one or more nodes, and one or more Redis
instances can be deployed on one node. (On the MRS platform, the number of
Redis instances on each node is calculated by software based on the node
hardware resources.)
The latest Redis supports clusters. That is, multiple Redis instances constitute a
Redis cluster to provide a distributed key-value database. Clusters share data
through sharding and provide replication and failover functions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1294
Huawei Cloud Stack
Solution Description 15 EI Services
Note:
– A master instance has multiple slave instances. A slave instance can have
slave instances as well.
– Command requests sent to the master instance are synchronized to the
slave instance in real time.
– If the master instance is faulty, the slave instance will not be
automatically promoted to the master one.
– By default, the slave instance is read-only. If slave-read-only is set to no,
the slave instance can be written. But if the slave instance is restarted, it
will synchronize the data from the master instance, and the data written
to the slave instance earlier will be lost.
– The layered structure of slave instances reduces the number of instances
directly connected to the master instance. This structure improves service
processing performance of the master instance because the number of
slave instances that need to synchronize data from the master instance is
reduced.
● Cluster mode
Figure 15-120 shows the logical deployment mode of the cluster mode.
Note:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1295
Huawei Cloud Stack
Solution Description 15 EI Services
Redis-Data-Sync
Redis-Data-Sync is a tool for implementing data synchronization between the
active and standby Redis clusters. It synchronizes data of the logical clusters in the
active cluster to the standby cluster in real time and backs up the data to the
standby cluster so that a data replica of the active Redis cluster can be generated.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1296
Huawei Cloud Stack
Solution Description 15 EI Services
If the cluster HA cannot be ensured when some nodes or instances are faulty at
the same time, alarms will be generated prompting that rectification is required.
MRS provides a dedicated data import and export tool, which can be used to
export data from the Redis cluster and restore data in the original cluster, new
cluster, and heterogeneous cluster (cluster with different numbers of nodes).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1297
Huawei Cloud Stack
Solution Description 15 EI Services
Performance Enhancement
Redis is a high-performance distributed database. However, deployment of Redis
instances on a command OS causes limited throughout when the number of
concurrent requests from clients increases even if the server has sufficient
resources. In addition, the Redis cluster performance cannot be linearly improved
with the cluster scaling-out. MRS has incorporated OS enhancement, including
CPU binding, NIC queue binding, and OS parameter optimization, ensuring high
Redis performance, especially linear performance improvement of Redis clusters.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1298
Huawei Cloud Stack
Solution Description 15 EI Services
Cluster Pipeline
The Redis server supports pipeline commands sent from clients. That is, the Redis
server can receive and process multiple commands at one time, shortening the
network transmission duration and increasing the number of requests processed
by the Redis server per second. However, the Jedis community provides only the
single-instance pipeline mode. The clients encapsulate Jedis to ensure that the
pipeline mode can also be applied in clusters and the use method of such pipeline
mode is the same as that of the single-instance pipeline mode.
15.1.5.32 RTDService
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1299
Huawei Cloud Stack
Solution Description 15 EI Services
Overview
RTDService provides GUIs for service configuration and RESTful APIs for users to
define tenants, event sources, dimensions, variables, rules, and models.
Principles
RTDService consists of the RTDServer role. Metadata such as event sources,
dimensions, dimension mapping, variables, models, and rules defined on the web
UI is permanently saved to DBService. After the event source dimension mapping
is brought online, the RTDServer role automatically generates a BLU application
and deploys the application in a group of containers of Containers. After variables
or rules defined on the RTDService web UI are brought online, RTDServer
automatically generates stored procedures and deploys them in MOTService.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1300
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1301
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.33 Solr
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1302
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1303
Huawei Cloud Stack
Solution Description 15 EI Services
Name Description
Basic Concept
● Collection: a complete logical index in a SolrCloud cluster. A Collection can be
divided into multiple Shards that use the same Config Set.
● Config Set: a group of configuration files required by Solr Core to provide
services. A Config Set includes solrconfig.xml and managed-schema.
● Core: refers to Solr Core. A Solr instance includes one or multiple Solr Cores.
Each Solr Core independently provides indexing and query functions. Each Solr
Core corresponds to an index or a Collection Shard Replica.
● Shard: a logical section of a Collection. Each Shard has multiple Replicas,
among which a leader is elected.
● Replica: a copy of a Shard. Each Replica is in a Solr Core.
● Leader: a Shard Replica elected from multiple Replicas. When documents are
indexed, SolrCloud transfers them to the leader, and the leader distributes
them to Replicas of the Shard.
● ZooKeeper: is mandatory in SolrCloud. It provides distributed lock and Leader
election functions.
Principle
● Descending-order Indexing
The traditional search (which uses the ascending-order indexing, as shown in
Figure 15-130) starts from keypoints and then uses the keypoints to find the
specific information that meets the search criteria. In the traditional mode,
values are found according to keys. During search based on the ascending-
order indexing, keywords are found by document number.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1304
Huawei Cloud Stack
Solution Description 15 EI Services
The Solr (Lucene) search uses the descending-order indexing mode (as shown
in Figure 15-131). In this mode, keys are found according to values. Values in
the full-text search indicate the keywords that need to be searched. Places
where the keywords are stored are called dictionaries. Keys indicate document
number lists, with which users can find the documents that contain the search
keywords (values), as shown in the following figure. During search based on
the descending-order indexing, document numbers are found by keyword and
then documents are found by document number.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1305
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1306
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1307
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.34 Spark
Description
Spark is a memory-based distributed computing framework. In iterative
computation scenarios, the computing capability of Spark is 10 to 100 times
higher than MapReduce, because data is stored in memory when being processed.
Spark can use HDFS as the underlying storage system, enabling users to quickly
switch to Spark from MapReduce. Spark provides one-stop data analysis
capabilities, such as the streaming processing in small batches, offline batch
processing, SQL query, and data mining. Users can seamlessly use these functions
in a same application. For details about the new open source features of Spark,
see 15.1.5.34.4 Spark Open Source New Features.
Features of Spark are as follows:
● Improves the data processing capability through distributed memory
computing and directed acyclic graph (DAG) execution engine. The delivered
performance is 10 to 100 times higher than that of MapReduce.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1308
Huawei Cloud Stack
Solution Description 15 EI Services
Architecture
Figure 15-134 describes the Spark architecture and Table 15-30 lists the Spark
modules.
Module Description
Driver Program The main process of the Spark application. It runs the
main() function of an application and creates SparkContext.
It is used for parsing applications, generating stages, and
scheduling tasks to executors. Usually, SparkContext
represents Driver Program.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1309
Huawei Cloud Stack
Solution Description 15 EI Services
Module Description
Worker Node A node that starts and manages executors and resources in
a cluster.
Stage Each job consists of multiple stages. Each stage is a task set,
which is separated by Directed Acyclic Graph (DAG).
Spark Principles
Figure 15-135 describes the application running architecture of Spark.
1. An application is running in the cluster as a collection of processes. Driver
coordinates the running of the application.
2. To run an application, Driver connects to the cluster manager (such as
Standalone, Mesos, and Yarn) to apply for the executor resources, and start
ExecutorBackend. The cluster manager schedules resources between different
applications. Driver schedules DAGs, divides stages, and generates tasks for
the application at the same time.
3. Then, Spark sends the codes of the application (the codes transferred to
SparkContext, which is defined by JAR or Python) to an executor.
4. After all tasks are finished, the running of the user application is stopped.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1310
Huawei Cloud Stack
Solution Description 15 EI Services
Spark uses Master and Worker modes, as shown in Figure 15-136. A user submits
an application on the Spark client, and then the scheduler divides a job into
multiple tasks and sends the tasks to each Worker for execution. Each Worker
reports the computation results to Driver (Master), and then the Driver aggregates
and returns the results to the client.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1311
Huawei Cloud Stack
Solution Description 15 EI Services
● You are advised to deploy the Driver program in a location that is close to the
Worker node because the Driver program schedules tasks in the cluster. For
example, deploy the Driver program on the network where the Worker node
is located.
In Direct Streaming approach, Direct API is used to process data. Take Kafka Direct
API as an example. Direct API provides offset location that each batch range will
read from, which is much simpler than starting a receiver to continuously receive
data from Kafka and written data to write-ahead logs (WALs). Then, each batch
job is running and the corresponding offset data is ready in Kafka. These offset
information can be securely stored in the checkpoint file and read by applications
that failed to start.
After the failure, Spark Streaming can read data from Kafka again and process the
data segment. The processing result is the same no matter Spark Streaming fails
or not, because the semantic is processed only once.
Direct API does not need to use the WAL and Receivers, and ensures that each
Kafka record is received only once, which is more efficient. In this way, the Spark
Streaming and Kafka can be well integrated, making streaming channels be
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1312
Huawei Cloud Stack
Solution Description 15 EI Services
featured with high fault-tolerance, high efficiency, and ease-of-use. Therefore, you
are advised to use Direct Streaming to process data.
Receiver computing process
When a Spark Streaming application starts (that is, when the driver starts), the
related StreamingContext (the basis of all streaming functions) uses SparkContext
to start the receiver to become a long-term running task. These receivers receive
and save streaming data to the Spark memory for processing. Figure 15-138
shows the data transfer lifecycle.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1313
Huawei Cloud Stack
Solution Description 15 EI Services
architecture. That is, it periodically executes the same Spark computation in each
batch data. Such architecture allows it to periodically store checkpoints to reliable
storage space and recover them upon the restart of Driver.
For source data such as files, the Driver recovery mechanism can ensure zero data
loss because all data is stored in a fault-tolerant file system such as HDFS.
However, for other data sources such as Kafka and Flume, some received data is
cached only in memory and may be lost before being processed. This is caused by
the distribution operation mode of Spark applications. When the driver process
fails, all executors running in the Cluster Manager, together with all data in the
memory, are terminated. To avoid such data loss, the WAL function is added to
Spark Streaming.
WAL is often used in databases and file systems to ensure persistence of any data
operation. That is, first record an operation to a persistent log and perform this
operation on data. If the operation fails, the system is recovered by reading the log
and re-applying the preset operation. The following describes how to use WAL to
ensure persistence of received data:
Receiver is used to receive data from data sources such as Kafka. As a long-time
running task in Executor, Receiver receives data, and also confirms received data if
supported by data sources. Received data is stored in the Executor memory, and
Driver delivers a task to Executor for processing.
After WAL is enabled, all received data is stored to log files in the fault-tolerant
file system. Therefore, the received data does not lose even if Spark Streaming
fails. Besides, receiver checks correctness of received data only after the data is
pre-written into logs. Data that is cached but not stored can be sent again by data
sources after the driver restarts. These two mechanisms ensure zero data loss.
That is, all data is recovered from logs or re-sent by data sources.
After WAL is enabled, all receivers have the advantage of recovering from reliable
received data. You are advised to disable the multi-replica mechanism because the
fault-tolerant file system of WAL may also replicate the data.
NOTE
The data receiving throughput is lowered after WAL is enabled. All data is written into the
fault-tolerant file system. As a result, the write throughput of the file system and the
network bandwidth for data replication may become the potential bottleneck. To solve this
problem, you are advised to create more receivers to increase the degree of data receiving
parallelism or use better hardware to improve the throughput of the fault-tolerant file
system.
Recovery Process
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1314
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1315
Huawei Cloud Stack
Solution Description 15 EI Services
Spark SQL is a module for processing structured data. In Spark application, SQL
statements or DataSet APIs can be seamlessly used for querying structured data.
Spark SQL and DataSet also provide a universal method for accessing multiple
data sources such as Hive, CSV, Parquet, ORC, JSON, and JDBC. These data sources
also allow data interaction. Spark SQL reuses the Hive frontend processing logic
and metadata processing module. With the Spark SQL, you can directly query
existing Hive data.
In addition, Spark SQL also provides API, CLI, and JDBC APIs, allowing diverse
accesses to the client.
Spark SQL Native DDL/DML
In Spark 1.5, lots of Data Definition Language (DDL)/Data Manipulation Language
(DML) commands are pushed down to and run on the Hive, causing coupling with
the Hive and inflexibility such as unexpected error reports and results.
Spark realizes command localization and replaces Hive with Spark SQL Native
DDL/DML to run DDL/DML commands. Additionally, the decoupling from the Hive
is realized and commands can be customized.
DataSet
A DataSet is a strongly typed collection of domain-specific objects that can be
transformed in parallel using functional or relational operations. Each Dataset also
has an untyped view called a DataFrame, which is a Dataset of Row.
The DataFrame is a structured and distributed dataset consisting of multiple
columns. The DataFrame is equal to a table in the relationship database or the
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1316
Huawei Cloud Stack
Solution Description 15 EI Services
DataFrame in the R/Python. The DataFrame is the most basic concept in the Spark
SQL, which can be created by using multiple methods, such as the structured
dataset, Hive table, external database or RDD.
● The most common way is by pointing Spark to some files on storage systems,
using the read function available on a SparkSession.
val people = spark.read.parquet("...").as[Person] // Scala
DataSet<Person> people = spark.read().parquet("...").as(Encoders.bean(Person.class));//Java
● You can also create a DataSet using the transformation operation available on
an existing one. For example, apply the map operation on an existing DataSet
to create a DataSet:
val names = people.map(_.name) // In Scala: names is Dataset.
Dataset<String> names = people.map((Person p) -> p.name, Encoders.STRING)); // Java
In addition to programming APIs, Spark SQL also provides the CLI/JDBC APIs.
● Both spark-shell and spark-sql scripts can provide the CLI for debugging.
● JDBCServer provides JDBC APIs. External systems can directly send JDBC
requests to calculate and parse structured data.
SparkSession Principle
SparkSession is a unified API in Spark and can be regarded as a unified entry for
reading data. SparkSession provides a single entry point to perform many
operations that were previously scattered across multiple classes, and also
provides accessor methods to these older classes to maximize compatibility.
● SparkSession can be used to execute SQL queries on data and return results
as DataFrame.
sparkSession.sql("select * from person").show
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1317
Huawei Cloud Stack
Solution Description 15 EI Services
Each query operation will generate a result table. At each trigger interval, updated
data will be synchronized to the result table. Whenever the result table is updated,
the updated result will be written into an external storage system.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1318
Huawei Cloud Stack
Solution Description 15 EI Services
Concepts
● RDD
Resilient Distributed Dataset (RDD) is a core concept of Spark. It indicates a
read-only and partitioned distributed dataset. Partial or all data of this
dataset can be cached in the memory and reused between computations.
RDD Creation
– An RDD can be created from the input of HDFS or other storage systems
that are compatible with Hadoop.
– A new RDD can be converted from a parent RDD.
– An RDD can be converted from a collection of datasets through encoding.
RDD Storage
– You can select different storage levels to store an RDD for reuse. (There
are 11 storage levels to store an RDD.)
– By default, the RDD is stored in the memory. When the memory is
insufficient, the RDD overflows to the disk.
● RDD Dependency
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1319
Huawei Cloud Stack
Solution Description 15 EI Services
The RDD dependency includes the narrow dependency and wide dependency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1320
Huawei Cloud Stack
Solution Description 15 EI Services
The data and operation model of RDD are quite different from those of Scala.
val file = sc.textFile("hdfs://...")
val errors = file.filter(_.contains("ERROR"))
errors.cache()
errors.count()
a. The textFile operator reads log files from the HDFS and returns files (as
an RDD).
b. The filter operator filters rows with ERROR and assigns them to errors (a
new RDD). The filter operator is a transformation.
c. The cache operator caches errors for future use.
d. The count operator returns the number of rows of errors. The count
operator is an action.
Transformation includes the following types:
– The RDD elements are regarded as simple elements.
The input and output has the one-to-one relationship, and the partition
structure of the result RDD remains unchanged, for example, map.
The input and output has the one-to-many relationship, and the partition
structure of the result RDD remains unchanged, for example, flatMap
(one element becomes a sequence containing multiple elements after
map and then flattens to multiple elements).
The input and output has the one-to-one relationship, but the partition
structure of the result RDD changes, for example, union (two RDDs
integrates to one RDD, and the number of partitions becomes the sum of
the number of partitions of two RDDs) and coalesce (partitions are
reduced).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1321
Huawei Cloud Stack
Solution Description 15 EI Services
Operators of some elements are selected from the input, such as filter,
distinct (duplicate elements are deleted), subtract (elements only exist in
this RDD are retained), and sample (samples are taken).
– The RDD elements are regarded as key-value pairs.
Perform the one-to-one calculation on the single RDD, such as
mapValues (the partition mode of the source RDD is retained, which is
different from map).
Sort the single RDD, such as sort and partitionBy (partitioning with
consistency, which is important to the local optimization).
Restructure and reduce the single RDD based on key, such as groupByKey
and reduceByKey.
Join and restructure two RDDs based on the key, such as join and
cogroup.
NOTE
The later three operations involving sorting are called shuffle operations.
Action includes the following types:
– Generate scalar configuration items, such as count (the number of
elements in the returned RDD), reduce, fold/aggregate (the number of
scalar configuration items that are returned), and take (the number of
elements before the return).
– Generate the Scala collection, such as collect (import all elements in the
RDD to the Scala collection) and lookup (look up all values corresponds
to the key).
– Write data to the storage, such as saveAsTextFile (which corresponds to
the preceding textFile).
– Check points, such as the checkpoint operator. When Lineage is quite
long (which occurs frequently in graphics computation), it takes a long
period of time to execute the whole sequence again when a fault occurs.
In this case, checkpoint is used as the check point to write the current
data to stable storage.
● Shuffle
Shuffle is a specific phase in the MapReduce framework, which is located
between the Map phase and the Reduce phase. If the output results of Map
are to be used by Reduce, the output results must be hashed based on a key
and distributed to each Reducer. This process is called Shuffle. Shuffle involves
the read and write of the disk and the transmission of the network, so that
the performance of Shuffle directly affects the operation efficiency of the
entire program.
The figure below shows the entire process of the MapReduce algorithm.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1322
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1323
Huawei Cloud Stack
Solution Description 15 EI Services
Context
Based on existing JDBCServers in the community, multi-active-instance HA is used
to achieve the high availability. In this mode, multiple JDBCServers coexist in the
cluster and the client can randomly connect any JDBCServer to perform service
operations. When one or multiple JDBCServers stop working, a client can connect
to another normal JDBCServer.
Compared with active/standby HA, multi-active instance HA eliminates the
following restrictions:
● In active/standby HA, when the active/standby switchover occurs, the
unavailable period cannot be controlled by JDBCServer, but determined by
Yarn service resources.
● In Spark, the Thrift JDBC similar to HiveServer2 provides services and users
access services through Beeline and JDBC API. Therefore, the processing
capability of the JDBCServer cluster depends on the single-point capability of
the primary server, and the scalability is insufficient.
Multi-active instance HA not only prevents service interruption caused by
switchover, but also enables cluster scale-out to secure high concurrency.
Scenario
When one or more JDBCServer services in a cluster are abnormal, users can
automatically connect to other normal JDBCServer services without affecting
service running.
Implementation
The following figure shows the basic principle of multi-active instance HA of Spark
JDBCServer.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1324
Huawei Cloud Stack
Solution Description 15 EI Services
2. To connect to JDBCServer, the client must specify the namespace, which is the
directory of JDBCServer instances in ZooKeeper. During the connection, a
JDBCServer instance is randomly selected from the specified namespace. For
details about URL, see URL Connection.
3. After the connection succeeds, the client sends SQL statements to JDBCServer.
4. JDBCServer executes received SQL statements and sends results back to the
client.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1325
Huawei Cloud Stack
Solution Description 15 EI Services
● After the instance enters the maintenance mode (in which no new connection
request from the client is accepted), services still running on the instance may
fail when the decommissioning times out.
URL Connection
Multi-active instance mode
In multi-active instance mode, the client reads content from the ZooKeeper node
and connects to JDBCServer. The connection strings are as follows:
● Security mode:
– If Kinit authentication is enabled, the JDBCURL is as follows:
jdbc:hive2://
<zkNode1_IP>:<zkNode1_Port>,<zkNode2_IP>:<zkNode2_Port>,<zkNode3_IP>:<zkNode3_Port>/;s
erviceDiscoveryMode=zooKeeper;zooKeeperNamespace=sparkthriftserver;saslQop=auth-
conf;auth=KERBEROS;principal=spark2x/hadoop.<System domain name>@<System domain
name>;
NOTE
For example, when you use Beeline client for connection in common mode,
run the following command:
sh CLIENT_HOME/spark/bin/beeline -u "jdbc:hive2://
<zkNode1_IP>:<zkNode1_Port>,<zkNode2_IP>:<zkNode2_Port>,<zkNode3_IP>:
<zkNode3_Port>/;serviceDiscoveryMode=zooKeeper;zooKeeperNamespace=
sparkthriftserver;"
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1326
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
Background
In the JDBCServer multi-active instance mode, JDBCServer implements the Yarn-
client mode but only one Yarn resource queue is available. To solve the resource
limitation problem, the multi-tenant mode is introduced.
In multi-tenant mode, JDBCServers are bound with tenants. Each tenant
corresponds to one or more JDBCServers, and a JDBCServer provides services for
only one tenant. Different tenants can be configured with different Yarn queues to
implement resource isolation. In addition, JDBCServer can be dynamically started
as required to avoid resource waste.
Scenario
When there are multiple tenants in a cluster, JDBCServer is dynamically started as
required to ensure resource isolation between tenants, avoiding resource waste.
Implementation
Figure 15-147 shows the HA solution of the multi-tenant mode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1327
Huawei Cloud Stack
Solution Description 15 EI Services
In multi-tenant mode, the JDBCServer instance on MRS page indicates ProxyServer, the
JDBCServer agent.
An example is provided as follows:
serverUri=192.168.169.84:22550
;version=8.3.0;sequence=0000001244,serverUri=192.168.195.232:22550
;version=8.3.0;sequence=0000001242,serverUri=192.168.81.37:22550
;version=8.3.0;sequence=0000001243,
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1328
Huawei Cloud Stack
Solution Description 15 EI Services
URL Connection
Multi-tenant mode
In multi-tenant mode, the client reads content from the ZooKeeper node and
connects to ProxyServer. The connection strings are as follows:
● Security mode:
– If Kinit authentication is enabled, the client URL is as follows:
jdbc:hive2://
<zkNode1_IP>:<zkNode1_Port>,<zkNode2_IP>:<zkNode2_Port>,<zkNode3_IP>:<zkNode3_Port>/;s
erviceDiscoveryMode=zooKeeper;zooKeeperNamespace=sparkthriftserver;saslQop=auth-
conf;auth=KERBEROS;principal=spark2x/hadoop.<System domain name>@<System domain
name>;
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1329
Huawei Cloud Stack
Solution Description 15 EI Services
For example, when you use Beeline client for connection in common mode,
run the following command:
sh CLIENT_HOME/spark/bin/beeline -u "jdbc:hive2://
<zkNode1_IP>:<zkNode1_Port>,<zkNode2_IP>:<zkNode2_Port>,<zkNode3_IP>:
<zkNode3_Port>/;serviceDiscoveryMode=zooKeeper;zooKeeperNamespace=
sparkthriftserver;"
Non-multi-tenant mode
In non-multi-tenant mode, a client connects to a specified JDBCServer node.
Compared with multi-active instance mode, the connection string in non-multi-
active instance mode does not contain serviceDiscoveryMode and
zooKeeperNamespace parameters about ZooKeeper.
For example, when you use Beeline client to connect JDBCServer in non-multi-
tenant instance mode, run the following command:
sh CLIENT_HOME/spark/bin/beeline -u "jdbc:hive2://
<server_IP>:<server_Port>/;user.principal=spark2x/hadoop.<System domain
name>@<System domain name>;saslQop=auth-
conf;auth=KERBEROS;principal=spark2x/hadoop.<System domain
name>@<System domain name>;"
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1330
Huawei Cloud Stack
Solution Description 15 EI Services
Spark involves Driver and Executor. Driver schedules tasks and Executor runs tasks.
Figure 15-148 describes the file reading process.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1331
Huawei Cloud Stack
Solution Description 15 EI Services
● Yarn-cluster mode
Figure 15-150 describes the operation framework.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1332
Huawei Cloud Stack
Solution Description 15 EI Services
In Yarn-client mode, the Driver is deployed and started on the client. In Yarn-client
mode, the client of an earlier version is incompatible. The Yarn-cluster mode is
recommended.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1333
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
Purpose
Spark 3x provides some new open source features compared with Spark 1.5. The
specific features or concepts are as follows:
● DataSet: For details, see SparkSQL and DataSet Principle.
● Spark SQL Native DDL/DML: For details, see SparkSQL and DataSet
Principle.
● SparkSession: For details, see SparkSession Principle.
● Structured Streaming: For details, see Structured Streaming Principles.
● Optimizing Small Files
● Optimizing the Aggregate Algorithm
● Optimizing Datasource Tables
● Merging CBO
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1334
Huawei Cloud Stack
Solution Description 15 EI Services
Topology of CarbonData
CarbonData runs as a data source inside Spark. Therefore, CarbonData does not
start any additional processes on nodes in clusters. CarbonData engine runs inside
the Spark executor.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1335
Huawei Cloud Stack
Solution Description 15 EI Services
Data stored in CarbonData Table is divided into several CarbonData data files.
Each time when data is queried, CarbonData Engine reads and filters data sets.
CarbonData Engine runs as a part of the Spark Executor process and is responsible
for handling a subset of data file blocks.
Table data is stored in HDFS. Nodes in the same Spark cluster can be used as
HDFS data nodes.
CarbonData Features
● SQL: CarbonData is compatible with Spark SQL and supports SQL query
operations performed on Spark SQL.
● Simple Table dataset definition: CarbonData allows you to define and create
datasets by using user-friendly Data Definition Language (DDL) statements.
CarbonData DDL is flexible and easy to use, and can define complex tables.
● Easy data management: CarbonData provides various data management
functions for data loading and maintenance. CarbonData supports bulk
loading of historical data and incremental loading of new data. Loaded data
can be deleted based on load time and a specific loading operation can be
undone.
● CarbonData file format is a columnar store in HDFS. This format has many
new column-based file storage features, such as table splitting and data
compression. CarbonData has the following characteristics:
– Stores data along with index: Significantly accelerates query performance
and reduces the I/O scans and CPU resources, when there are filters in
the query. CarbonData index consists of multiple levels of indices. A
processing framework can leverage this index to reduce the task that
needs to be schedules and processed, and it can also perform skip scan in
more finer grain unit (called blocklet) in task side scanning instead of
scanning the whole file.
– Operable encoded data: Through supporting efficient compression and
global encoding schemes, CarbonData can query on compressed/encoded
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1336
Huawei Cloud Stack
Solution Description 15 EI Services
data. The data can be converted just before returning the results to the
users, which is called late materialized.
– Supports various use cases with one single data format: like interactive
OLAP-style query, sequential access (big scan), and random access
(narrow scan).
Scenario
Enterprises usually store massive data, such as from various databases and
warehouses, for management and information collection. However, diversified
data sources, hybrid dataset structures, and scattered data storage lower query
efficiency.
The open source Spark only supports simple filter pushdown during querying of
multi-source data. The SQL engine performance is deteriorated due of a large
amount of unnecessary data transmission. The pushdown function is enhanced, so
that aggregate, complex projection, and complex predicate can be pushed to
data sources, reducing unnecessary data transmission and improving query
performance.
Only the JDBC data source supports pushdown of query operations, such as
aggregate, projection, predicate, aggregate over inner join, and aggregate
over union all. All pushdown operations can be enabled based on your
requirements.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1337
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1338
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1339
Huawei Cloud Stack
Solution Description 15 EI Services
Precautions
● If external data source is Hive, query operation cannot be performed on
foreign tables created by Spark.
● Only MySQL and MPPDB data sources are supported.
15.1.5.35 Tez
Tez is Apache's latest open source computing framework that supports Directed
Acyclic Graph (DAG) jobs. It can convert multiple dependent jobs into one job,
greatly improving the performance of DAG jobs. If projects like Hive and Pig use
Tez instead of MapReduce as the backbone of data processing, response time will
be significantly reduced. Tez is built on YARN and can run MapReduce jobs
without any modification.
MRS uses Tez as the default execution engine of Hive. Tez remarkably surpasses
the original MapReduce computing engine in terms of execution efficiency.
For details about Tez, see https://tez.apache.org/.
Figure 15-154 Processes for submitting tasks using Hive on MapReduce and Hive
on Tez
A Hive on MapReduce task contains multiple MapReduce tasks. Each task stores
intermediate results to HDFS. The reducer in the previous step provides data for
the mapper in the next step. A Hive on Tez task can complete the same processing
process in only one task, and HDFS does not need to be accessed between tasks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1340
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.36 YARN
NOTE
An application is either a single job in the classical sense of MapReduce jobs or a Directed
Acyclic Graph (DAG) of jobs.
Architecture
ResourceManager is the essence of the layered structure of YARN. This entity
controls an entire cluster and manages the allocation of applications to underlying
compute resources. The ResourceManager carefully allocates various resources
(compute, memory, bandwidth, and so on) to underlying NodeManagers (YARN's
per-node agents). The ResourceManager also works with ApplicationMasters to
allocate resources, and works with the NodeManagers to start and monitor their
underlying applications. In this context, the ApplicationMaster has taken some of
the role of the prior TaskTracker, and the ResourceManager has taken the role of
the JobTracker.
ApplicationMaster manages each instance of an application running in YARN. The
ApplicationMaster negotiates resources from the ResourceManager and works
with the NodeManagers to monitor container execution and resource usage (CPU
and memory resource allocation).
The NodeManager manages each node in a YARN cluster. The NodeManager
provides per-node services in a cluster, from overseeing the management of a
container over its lifecycle to monitoring resources and tracking the health of its
nodes. MRv1 manages execution of the Map and Reduce tasks through slots,
whereas the NodeManager manages abstract containers, which represent per-
node resources available for a particular application.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1341
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1342
Huawei Cloud Stack
Solution Description 15 EI Services
Name Description
Applicatio AM (App Mstr in the figure above) is responsible for all tasks
nMaster(A through the lifcycle of in an application. The tasks include the
M) following: Negotiate with an RM scheduler to obtain a resource;
further allocate the obtained resources to internal tasks (secondary
allocation of resources); communicate with the NM to start or stop
tasks; monitor the running status of all tasks; and apply for
resources for tasks again to restart the tasks when the tasks fail to
be executed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1343
Huawei Cloud Stack
Solution Description 15 EI Services
Principle
The new Hadoop MapReduce framework is named MRv2 or YARN. YARN consists
of ResourceManager, ApplicationMaster, and NodeManager.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1344
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1345
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1346
Huawei Cloud Stack
Solution Description 15 EI Services
status information. Currently, three methods are provided for sharing status
information by file system (FileSystemRMStateStore), LevelDB database
(LeveldbRMStateStore), and ZooKeeper (ZKRMStateStore). Among them, only
ZKRMStateStore supports the Fencing mechanism. By default, Hadoop uses
ZKRMStateStore.
For more information about the YARN HA solution, visit the following website:
https://hadoop.apache.org/docs/r3.3.1/hadoop-yarn/hadoop-yarn-site/
ResourceManagerHA.html
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1347
Huawei Cloud Stack
Solution Description 15 EI Services
In YARN-client mode, the driver is deployed and started on the client. In YARN-client
mode, the client of an earlier version is incompatible. You are advised to use the
YARN-cluster mode.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1348
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
Running containers are not suspended and resources are not released.
e. Drivers allocate tasks to the executors. Executors run tasks and report the
operating status to Drivers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1349
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
Container reuse is in conflict with task priority scheduling. If container reuse is enabled,
resources are being occupied, and task priority scheduling does not take effect.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1350
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1351
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1352
Huawei Cloud Stack
Solution Description 15 EI Services
Apart from the enhanced system throughput and utilization, Superior Scheduler
provides following major scheduling features:
● Multiple resource pools
Multiple resource pools help logically divide cluster resources and share them
among multiple tenants or queues. The division of resource pools supports
heterogeneous resources. Resource pools can be divided exactly according to
requirements on the application resource isolation. You can configure further
policies for different queues in a pool.
● Multi-tenant scheduling (reserve, min, share, and max) in each resource pool
Superior Scheduler provides flexible hierarchical multi-tenant scheduling
policy. Different policies can be configured for different tenants or queues that
can access different resource pools. The following figure lists supported
policies:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1353
Huawei Cloud Stack
Solution Description 15 EI Services
Name Description
max This policy is used for the maximum resources that can be
utilized. The tenant cannot obtain more resources than the
allowed maximum value. The value can be a percentage or
an absolute value. If both the percentage and absolute value
are configured, the percentage is automatically calculated
into an absolute value, and the larger value is used. By
default value, there is no restriction on resources.
NOTE
In the above figure, Total indicates the total number of resources, not the scheduling
policy.
Compared with open source schedulers, Superior Scheduler supports both
percentage and absolute value of tenants for allocating resources, flexibly
addressing resource scheduling requirements of enterprise-level tenants. For
example, resources can be allocated according to the absolute value of level-1
tenants, avoiding impact caused by changes of cluster scale. However,
resources can be allocated according to the allocation percentage of sub-
tenants, improving resource usages in the level-1 tenant.
● Heterogeneous and multi-dimensional resource scheduling
Superior Scheduler supports following functions except CPU and memory
scheduling:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1354
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1355
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1356
Huawei Cloud Stack
Solution Description 15 EI Services
To solve this problem, the CPU resources are allocated to each container based on
the ratio of virtual cores (vCores) to physical cores. If a container requires an
entire physical core, the container has it. If a container needs only some physical
cores, several containers may share the same physical core. The following figure
shows an example of the CPU quota. The given ratio of vCores to physical cores is
2:1.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1357
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.5.37 ZooKeeper
Overview
ZooKeeper is a distributed, highly available coordination service. ZooKeeper is
used to provide following functions:
● Prevents the system from SPOFs and provides reliable services for
applications.
● Provides distributed coordination services and manages configuration
information.
Architecture
Nodes in a ZooKeeper cluster have three roles: Leader, Follower, and Observer, as
shown in Figure 15-166. Generally, an odd number of (2N+1) ZooKeeper services
need to be configured in the cluster, and at least (N+1) vote majority is required
to successfully perform the write operation.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1358
Huawei Cloud Stack
Solution Description 15 EI Services
Table 15-35 describes the functions of each module shown in Figure 15-166.
Name Description
Leader Only one node serves as the Leader in a ZooKeeper cluster. The
Leader, elected by Followers using the ZooKeeper Atomic Broadcast
(ZAB) protocol, receives and coordinates all write requests and
synchronizes written information to Followers and Observers.
Observ The Observer does not take part in voting for election and write
er requests. It only processes read requests and forwards write requests
to the Leader, increasing system processing efficiency.
Client Reads and writes data from or to the ZooKeeper cluster. For example,
HBase can serve as a ZooKeeper client and use the arbitration
function of the ZooKeeper cluster to control the active/standby status
of HMaster.
If security services are enabled in the cluster, authentication is required during the
connection to ZooKeeper. The authentication modes are as follows:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1359
Huawei Cloud Stack
Solution Description 15 EI Services
● Keytab mode: You need to obtain a human-machine user from the MRS
cluster administrator for MRS console login and authentication, and obtain
the Keytab file of the user.
● Ticket mode: Obtain a human-machine user from the MRS cluster
administrator for subsequent secure login, enable the renewable and
forwardable functions of the Kerberos service, set the ticket update period,
and restart Kerberos and related components.
NOTE
● By default, the validity period of the user password is 90 days. Therefore, the
validity period of the obtained Keytab file is 90 days.
● The parameters for enabling the renewable and forwardable functions and setting
the ticket update interval are on the System tab of the Kerberos service
configuration page. The ticket update interval can be set to kdc_renew_lifetime or
kdc_max_renewable_life based on the actual situation.
Principles
● Write Request
a. After the Follower or Observer receives a write request, the Follower or
Observer sends the request to the Leader.
b. The Leader coordinates Followers to determine whether to accept the
write request by voting.
c. If more than half of voters return a write success message, the Leader
submits the write request and returns a success message. Otherwise, a
failure message is returned.
d. The Follower or Observer returns the processing results.
● Read-Only Request
The client directly reads data from the Leader, Follower, or Observer.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1360
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1361
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1362
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1363
Huawei Cloud Stack
Solution Description 15 EI Services
Enhanced Log
In security mode, an ephemeral node is deleted as long as the session that created
the node expires. Ephemeral node deletion is recorded in audit logs so that
ephemeral node status can be obtained.
Usernames must be added to audit logs for all operations performed on
ZooKeeper clients.
On the ZooKeeper client, create a znode, of which the Kerberos principal is zkcli/
hadoop.<System domain name>@<System domain name>.
For example, open the <ZOO_LOG_DIR>/zookeeper_audit.log file. The file
content is as follows:
2016-12-28 14:17:10,505 | INFO | CommitProcWorkThread-4 | session=0x12000007553b4903?
user=10.177.223.78,zkcli/hadoop.hadoop.com@HADOOP.COM?ip=10.177.223.78?operation=create znode?
target=ZooKeeperServer?znode=/test1?result=success
2016-12-28 14:17:10,530 | INFO | CommitProcWorkThread-4 | session=0x12000007553b4903?
user=10.177.223.78,zkcli/hadoop.hadoop.com@HADOOP.COM?ip=10.177.223.78?operation=create znode?
target=ZooKeeperServer?znode=/test2?result=success
2016-12-28 14:17:10,550 | INFO | CommitProcWorkThread-4 | session=0x12000007553b4903?
user=10.177.223.78,zkcli/hadoop.hadoop.com@HADOOP.COM?ip=10.177.223.78?operation=create znode?
target=ZooKeeperServer?znode=/test3?result=success
2016-12-28 14:17:10,570 | INFO | CommitProcWorkThread-4 | session=0x12000007553b4903?
user=10.177.223.78,zkcli/hadoop.hadoop.com@HADOOP.COM?ip=10.177.223.78?operation=create znode?
target=ZooKeeperServer?znode=/test4?result=success
2016-12-28 14:17:10,592 | INFO | CommitProcWorkThread-4 | session=0x12000007553b4903?
user=10.177.223.78,zkcli/hadoop.hadoop.com@HADOOP.COM?ip=10.177.223.78?operation=create znode?
target=ZooKeeperServer?znode=/test5?result=success
2016-12-28 14:17:10,613 | INFO | CommitProcWorkThread-4 | session=0x12000007553b4903?
user=10.177.223.78,zkcli/hadoop.hadoop.com@HADOOP.COM?ip=10.177.223.78?operation=create znode?
target=ZooKeeperServer?znode=/test6?result=success
2016-12-28 14:17:10,633 | INFO | CommitProcWorkThread-4 | session=0x12000007553b4903?
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1364
Huawei Cloud Stack
Solution Description 15 EI Services
user=10.177.223.78,zkcli/hadoop.hadoop.com@HADOOP.COM?ip=10.177.223.78?operation=create znode?
target=ZooKeeperServer?znode=/test7?result=success
The content shows that logs of the ZooKeeper client user zkcli/
hadoop.hadoop.com@HADOOP.COM are added to the audit log.
Example:
The open source server supports only plain text passwords, which may cause
security problems. Therefore, such text passwords are no longer used on the
server.
● Client
a. Set -Dzookeeper.client.secure in the zkCli.sh/zkEnv.sh file to true to use
secure communication on the client. Then, the client can connect to the
secureClientPort on the server.
b. Set the following parameters in the zkCli.sh/zkEnv.sh file to configure
the client environment:
Parameter Description
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1365
Huawei Cloud Stack
Solution Description 15 EI Services
Parameter Description
- Encrypts a password.
Dzookeeper.ssl.trustStore.password
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1366
Huawei Cloud Stack
Solution Description 15 EI Services
Parameter Description
d. Start ZKserver and connect the security client to the security port.
● Credential
The credential used between client and server in ZooKeeper is
X509AuthenticationProvider. This credential is initialized using the server
certificates specified and trusted by the following parameters:
– zookeeper.ssl.keyStore.location
– zookeeper.ssl.keyStore.password
– zookeeper.ssl.trustStore.location
– zookeeper.ssl.trustStore.password
NOTE
If you do not want to use default mechanism of ZooKeeper, then it can be configured
with different trust mechanisms as needed.
15.1.6 Functions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1367
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
If the MRS storage and compute decoupling solution is used, note the following:
● In the storage-compute decoupling scenario, use the parallel file system of OBS 3.0 to
store data. Do not use OBS buckets.
● Job submission based on the Guardian storage and compute decoupling management
plane depends on JobGateWay instead of Executor.
● After an MRS cluster is interconnected with OBS, some function restrictions are as
follows:
● Some refined monitoring metrics collected based on the HDFS file system cannot
be properly displayed.
● The data snapshot, backup, and restoration functions of components are not
supported.
● The components do not support cluster active/standby DR.
● The tools for migrating data from HBase and HDFS to Elasticsearch of the
Elasticsearch component are not supported.
● IPv6-based MRS clusters cannot connect to OBS using the Guardian service. PM
clusters do not support job submission on the management console.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1368
Huawei Cloud Stack
Solution Description 15 EI Services
service table authorization on the Ranger page and the system automatically
associates the permissions of OBS data storage source in a fine-grained manner.
The storage path of the table does not need to be sensed.
NOTE
● On the Ranger page, OBS permission authorization only support Manager custom user
groups (built-in user groups are not supported). The user group contains a maximum of
52 characters, including digits 0 to 9, letters A to Z, underscores (_), and number signs
(#). Otherwise, the policy fails to be added.
● For clusters in the security mode, Ranger is needed for permission authorization. For
normal clusters, OBS permissions are granted by default and no additional configuration
is required.
15.1.6.2 Multi-tenancy
Definition
Multi-tenancy refers to multiple resource sets (a resource set is a tenant) in the
MRS big data cluster and is able to allocate and schedule resources. The resources
include computing resources and storage resources.
Context
Modern enterprises' data clusters are becoming more and more centralized and
cloud-based. Enterprise-class big data clusters must meet the following
requirements:
● Carry data of different types and formats and run jobs and applications of
different types (such analysis, query, and stream processing).
● Isolate data of a user from that of another user who has demanding
requirements on data security, such as a bank or government institute.
The preceding requirements bring the following challenges to the big data
clusters:
● Proper allocation and scheduling of resources to ensure stable operating of
applications and jobs.
● Strict access control to ensure data and service security.
Multi-tenancy isolates the resources of a big data cluster into resource sets. Users
can lease desired resource sets to run applications and jobs and store data. In a
big data cluster, multiple resource sets can be deployed to meet diverse
requirements of multiple users.
The MRS big data cluster provides a complete enterprise-class big data multi-
tenant solution.
Highlights
● Proper resource configuration and isolation
The resources of a tenant are isolated from those of another tenant. The
resource use of a tenant does not affect other tenants. This mechanism
ensures that each tenant can configure resources based on service
requirements, improving resource utilization.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1369
Huawei Cloud Stack
Solution Description 15 EI Services
15.1.6.3 Multi-Service
Introduction
The multi-service feature means that you do not need to define multiple sets of
components. Manager allows you to install multiple sets of the same component
in a cluster to better solve resource isolation or performance problems.
The newly added instances have the same functional modules as existing services,
such as logs, users, and shell commands. Manager provides unified management
for HBase, Hive, and Spark instances, including monitoring, alarming, and starting
or stopping services. When importing and exporting data using Loader, extracting
metadata using Metadata, creating roles, backing up and restoring data, or
developing applications, the system administrator needs to select specific service
instances based on the actual situation.
The multi-service feature can linearly improve the overall service performance. The
service instance resources can be customized. Tenants can associate with different
service instances to enable services to run in isolated resources, improving
customer satisfaction and user experience.
NOTE
● The three sets of HBase components (HBase, HBase-1, and HBase-2) installed in the
same cluster are called three service instances.
● If multiple Elasticsearch services are installed in the same cluster, ensure that all
Elasticsearch services are in security mode or non-security mode.
● Physical machine clusters support the multi-service feature, whereas the ECS/BMS
clusters do not support this feature.
Constraints
1. The multi-service feature does not support co-host deployment. Specifically,
multiple services and roles of the same service cannot be deployed on the
same host.
2. The multi-service feature does not allow a service to connect to two
underlying services at the same time.
For example, one Hive service cannot be connected to multiple DBServices.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1370
Huawei Cloud Stack
Solution Description 15 EI Services
data nodes and control nodes. When an AZ domain is faulty, all or some upper-
layer services are not affected.
Currently, the following components support cross-AZ HA: CDL, ClickHouse,
DBService, Elasticsearch, Flink, FTP-Server, HBase, HDFS, HetuEngine, Hive, Hue,
Kafka, KrbServer, LdapServer, Loader, MapReduce, Oozie, Redis, Spark, Tez, Yarn,
and ZooKeeper.
NOTE
● Different AZs must be in the same network segment, and the cross-AZ network latency
must be within 2 ms.
● In the single-cluster cross-AZ solution, Yarn supports only the Superior scheduler.
● The single-cluster cross-AZ solution supports only the storage and compute integrated
architecture.
● It is recommended that the compute nodes, OSs, and basic system configurations (CPU,
memory, and disk capacity) of each AZ be the same.
● This function applies only to MRS physical machine clusters.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1371
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1372
Huawei Cloud Stack
Solution Description 15 EI Services
encounters a disaster, protected service data can be restored from the remote DR
center.
NOTICE
● "Active" and "DR" indicate a cluster's service status instead of the current
running status. The roles of active and DR clusters are fixed and do not
change with the running status. In the normal state, an active cluster is used
to run services, and a DR cluster is used for backup. In the DR state, a DR
cluster is used to run services, and an active cluster is used for backup.
● One active cluster maps one DR cluster. Currently, the following
configurations are not supported: One active cluster maps multiple DR
clusters (different data is backed up to different clusters), or one DR cluster
maps multiple active clusters.
● A DR cluster can be different from the active cluster but must have the service
that requires data DR in the active cluster.
Data components in an MRS cluster that can be configured with DR protection
include HDFS, Hive, HBase, Elasticsearch, Flink, and Redis. Data backup of
protected objects is classified into periodic backup and streaming backup by data
type.
● Periodic backup: The system periodically backs up data of protected objects
from the active cluster to the DR cluster based on a specified DR protection
policy. Components corresponding to periodic backup include HDFS, Hive, and
Flink.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1373
Huawei Cloud Stack
Solution Description 15 EI Services
Rolling Restart
Rolling restart refers that after the software of a service or role instance is
updated or the configuration is modified in a cluster, related objects are restarted
without interrupting services.
Conventional common restart (restarting all instances simultaneously) interrupts
services. Rolling restart adopts different restart policies for different instance
running features to ensure service continuity. However, rolling restart takes a long
time and exerts an impact on the throughput and performance of corresponding
services.
NOTE
Before performing a rolling restart of instances, ensure that the internal and external
interfaces are compatible before and after the rolling restart. If the interfaces are
incompatible after a major version update, perform a common restart.
● Rolling restart policy for active and standby instances
For roles that support high availability (HA), such as the HDFS NameNode,
perform a rolling restart on the standby instance first, manually trigger an
active/standby switchover, and then restart the original active instance after
the switchover.
● Rolling restart policy for the Leader instance
Each instance of a role is divided into a Leader node and multiple Follower
nodes. Therefore, the services are not interrupted when an instance is
restarted. In this case, restart all instances one by one. The Leader instance is
restarted at last.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1374
Huawei Cloud Stack
Solution Description 15 EI Services
Rolling Upgrade
Rolling upgrade is an online upgrade mode. During the upgrade process, service
interruption interval can be minimized.
Components that support rolling upgrade can provide all or part of their services.
Component services that do not support rolling upgrade are interrupted during
the upgrade process. Compared with the offline upgrade mode, rolling upgrade
can ensure that part of services are available during product upgrade.
For rolling upgrade operations and precautions of each service, see corresponding
upgrade guide.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1375
Huawei Cloud Stack
Solution Description 15 EI Services
Table 15-36 Impact on the system during the rolling restart of services and
instances
Service Unaffected Service Affected Service
Name
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1376
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1377
Huawei Cloud Stack
Solution Description 15 EI Services
Hive Hive services are normal If the execution time of an existing task
during the rolling exceeds the timeout interval of rolling
restart. restart, the task may fail during the
restart. You can retry the task if it fails.
IoTDB IoTDB read and write 1. During the rolling restart, some
operations metadata operations cannot be
performed, including creating and
deleting databases, deleting time
series, creating, deleting, and exporting
device snapshots, and performing
permission operations.
2. During the rolling restart, temporary
read inconsistency may occur.
Redis Redis read and write Capacity expansion or reduction for Redis
operations clusters cannot be performed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1378
Huawei Cloud Stack
Solution Description 15 EI Services
Solr Solr read and write Before the rolling restart, ensure that each
operations index shard has at least one leader shard
and one replica shard. Otherwise, data
may be lost.
Spark Except the listed items, ● When HBase is restarted, you cannot
other services are not create or delete Spark on HBase tables
affected. in Spark.
● When HBase is restarted, an active/
standby switchover is triggered for
HMaster. During the switching, the
Spark on HBase function is unavailable.
● If you have used the advanced API of
Kafka, interruption may occur when
Spark reads/writes data from/to Kafka
during the rolling restart, and data
may be lost.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1379
Huawei Cloud Stack
Solution Description 15 EI Services
CDLService 1 min
HSFabric 30 min
JournalNode 2 min
NameNode 4 min + x
x indicates the NameNode metadata
loading duration. It takes about 2
minutes to load 10,000,000 files. For
example, x is 10 minutes for 50 million
files. The startup duration fluctuates
with reporting of DataNode data blocks.
Zkfc 2 min
MetaStore 1 min
Kafka UI 5 min
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1380
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1381
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1382
Huawei Cloud Stack
Solution Description 15 EI Services
● Data confidentiality
The HDFS incorporates encrypted storage for file contents based on the
Apache Hadoop version to prevent sensitive data being stored in plain text
and improves the data security. Service applications need only to encrypt
specified sensitive data. The data encryption and decryption processes are
unknown to enterprise users. In addition, Hive implements table-level
encryption, and HBase implements column-level encryption. During data
creation, specify the encryption algorithm to ensure encrypted storage of
sensitive data.
The data confidentiality is ensured by encrypted data storage and access
control.
– The HBase compresses data before storing the data to the HDFS. In
addition, users can configure the AES and SMS4 algorithms to ensure
encrypted storage.
– Each component supports setting of access rights for local data
directories. Unauthorized users cannot access the data.
– Information about users in a cluster is stored in encrypted mode.
● Security authentication
– The unified user- and role-based authentication system complies with the
role-based access control model to manage rights based on the role,
ensuring batch user rights authorization.
– MRS supports the security protocol Kerberos, uses the LDAP server as the
account management system, and authenticates account information
using Kerberos.
– MRS provides single sign-on (SSO) to provide unified management and
authentication for system users and component users of MRS.
– MRS provides auditing for users logging in to FusionInsight Manager.
– MRS provides the unified certificate management function, which allows
certificates of the entire cluster to be configured and replaced in a unified
manner on the portal. This makes users' certification replacement easier.
System reliability
● High availability (HA) for management nodes of all components
Data and compute nodes of the Hadoop open-source version are designed
based on the distributed system. Therefore, the whole system is not affected
by single point of failures (SPOFs) of data and compute nodes. However,
management nodes operate in centralized mode. SPOFs of management
nodes affect the whole system reliability.
Huawei MRS provides the dual-node mechanism for management nodes, such
as OMS server, HDFS, NameNode, Hive Server, HBase HMaster, YARN
Resources Manager, Kerberos Server, and Ldap Server of all service
components. The management nodes work in active/standby or load-sharing
mode, preventing impact of SPOFs on system reliability.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1383
Huawei Cloud Stack
Solution Description 15 EI Services
Node reliability
● OS health status monitoring
MRS provides the following monitoring measures for the OS:
– Adjusting OS kernel parameters to restart the OS and restore services
when a critical fault, for example, memory exhaust, invalid address
accessing, kernel dead lock, or invalid dispatcher occurs in the OS
– Periodically collecting OS running status data, including the processor
status, memory status, hard disk status, and network status
● Process health status monitoring
NodeAgent is deployed on all nodes of MRS to monitor service instance status
and health status of service instance processes.
● Automatic processing of hard disk faults
MRS is enhanced based on the community version. It can monitor the status
of hardware and file systems on all nodes. If a partition is faulty, the
corresponding partition will be separated from the storage pool. If the whole
hard disk is faulty and replaced, the new hard disk will be added to the
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1384
Huawei Cloud Stack
Solution Description 15 EI Services
Data reliability
MRS monitors hardware (especially hard disks), OS, and processes of nodes to
discover exceptions in time. In this case, the fault detection and restoration time is
reduced, and the data persistence rate of the whole system is improved.
Overview
In traditional big data clusters, user data is stored in plaintext in the HDFS. Cluster
maintenance personnel or malicious attackers can bypass the HDFS permission
control mechanism or steal disks to directly access user data.
MRS introduces and enhances the Hadoop Key Management Service (KMS). By
interconnecting with the third-party KMS or Huawei Cloud Stack KMS, MRS can
implement transparent data encryption and ensure user data security.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1385
Huawei Cloud Stack
Solution Description 15 EI Services
Figure 15-173 HDFS data storage encryption interconnecting with Huawei Cloud
Stack KMS
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1386
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1387
Huawei Cloud Stack
Solution Description 15 EI Services
correspond to the encryption area in the HDFS and are used to encrypt the
data encryption key. The EZK is stored in the key database of Ranger KMS
persistently.
● DEKs are generated by Ranger KMS, encrypted using EZK, and then stored in
the NameNode permanently. DEKs are decrypted using EZKs when needed.
FusionInsight script tool uses the LUKS partition encryption solution. This solution
generates an access key on each node of a cluster or obtains the access key from
the third-party KMS when encrypting partitions. The access key is used to encrypt
data keys to improve data key security. After the disk partitions are encrypted in
the scenario when the OS is restarted or the disk is changed, the system
automatically obtains the key and mounts or creates the encrypted partition.
Function Description
MRS allows you to configure inspection rules for mainstream SQL engines (Hive,
Spark, HetuEngine, and ClickHouse). MRS can identify typical large SQL queries
and low-quality SQL statements and intercepts them before execution or block
them during execution. Users do not need to change how they submit SQL
statements or change SQL syntax. Service modifications are not required and
inspection is easy to implement.
● You can configure SQL inspection rules on the UI that also allows you to
query and modify the rules.
● During query response and execution, each SQL engine proactively inspects
SQL statements based on the rules.
● Administrators can select to display hints on, intercept, or block SQL
statements. The system logs SQL inspection events in real time for SQL audit.
O&M engineers can analyze the logs, evaluate SQL statement quality on the
live network, detect target statements, and take effective measures.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1388
Huawei Cloud Stack
Solution Description 15 EI Services
● Runtime Blocking: The system blocks SQL statements based on system states
(such as CPU, memory, and I/O) during the runtime of the SQL statements.
SQL requests that meet the static and dynamic interception rules can be
intercepted, and the system gives hints for processing the statements properly. If a
SQL request meets the blocking rule, the system blocks the SQL task.
Software List
Table 15-38 lists the versions of open-source components used by MRS.
Doris 1.2.3 - - - - - - -
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1389
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1390
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1391
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1392
Huawei Cloud Stack
Solution Description 15 EI Services
The MRS ECS/BMS cluster is created in the subnets of a VPC. VPCs provide a
secure, isolated, and logical network environment for your MRS clusters.
● Object Storage Service (OBS)
When MRS is interconnected with OBS 3.0 during MRS installation, the
components in the MRS ECS/BMS cluster can store data in OBS to implement
storage and compute decoupling.
Currently, Flink, Hadoop (HDFS/Yarn/MapReduce), HBase, HetuEngine, Hive,
Loader, Spark, and Hudi in MRS clusters can connect to OBS 3.0 to help
implement storage-compute decoupling. MRS uses the Guardian component
to connect to the OBS parallel file system and provide other components with
the temporary authentication credentials and fine-grained permission control
capabilities for accessing OBS.
● Elastic Cloud Server (ECS)
Each node in an MRS ECS cluster is an ECS.
● Bare Metal Server (BMS)
Each node in an MRS BMS cluster is a BMS.
● Simple Message Notification (SMN)
MRS uses SMN to offer a publish/subscribe model to achieve one-to-multiple
alarm message subscriptions and notifications in a variety of message types
(SMSs and emails).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1393
Huawei Cloud Stack
Solution Description 15 EI Services
MRS operation Users that have the full There are two setting
permissions operation permissions on MRS methods:
resources ● Set the MRS FullAccess,
VPC Administrator, EVS
Administrator, Server
Administrator, and SMN
Administrator for the user
group where a user
belongs.
● Assign the MRS
Administrator, Server
Administrator, Tenant
Guest roles to the user
group where a user
belongs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1394
Huawei Cloud Stack
Solution Description 15 EI Services
Maximum number of 5 -
blocks on a DataNode million
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1395
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1396
Huawei Cloud Stack
Solution Description 15 EI Services
Number of records 1 to -
supported by a single core 400
million
Maximum memory 31 GB -
configuration of a single
SolrServer
Maximum memory 31 GB -
configuration of a single
Elasticsearch instance
Number of records 1 to -
supported by a single 400
shard million
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1397
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1398
Huawei Cloud Stack
Solution Description 15 EI Services
Minimum memory 1 GB -
allocated for JVMs of
coordinators or workers in
a compute instance
Number of 1–100 -
interconnected data
sources on the HSConsole
page
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1399
Huawei Cloud Stack
Solution Description 15 EI Services
Version Form
When GaussDB(DWS) is installed, the following types of clusters are provided:
Elastic Cloud Server (ECS) and Bare Metal Server (BMS) clusters installed using
images, and physical machine clusters managed by ManageOne.
NOTE
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1400
Huawei Cloud Stack
Solution Description 15 EI Services
Architecture
GaussDB(DWS) employs the shared-nothing architecture and the massively
parallel processing (MPP) engine, and consists of numerous independent logical
nodes that do not share the system resources such as CPUs, memory, and storage.
In such a system architecture, service data is separately stored on numerous
nodes. Data analysis tasks are executed in parallel on the nodes where data is
stored. The massively parallel data processing significantly improves response
speed.
● Application layer
Data loading tools, extract, transform, and load (ETL) tools, business
intelligence (BI) tools, as well as data mining and analysis tools, can be
integrated with GaussDB(DWS) through standard APIs. GaussDB(DWS) is
compatible with the PostgreSQL ecosystem, and the SQL syntax is compatible
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1401
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1402
Huawei Cloud Stack
Solution Description 15 EI Services
Global Generates and maintains The cluster includes only one pair of
Transa the globally unique GTMs: one primary GTM and one standby
ction information, such as the GTM.
Mana transaction ID, transaction
ger snapshot, and timestamp.
(GTM)
DNs in a cluster store data on disks. Figure 15-178 describes the objects on each
DN and the relationships among them logically.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1403
Huawei Cloud Stack
Solution Description 15 EI Services
Data can be distributed in replication, round-robin, or hash mode. You can specify
the distribution mode during table creation.
15.2.2 Advantages
GaussDB(DWS) uses the GaussDB database kernel and is compatible with
PostgreSQL 9.2.4. It transforms from a single OLTP database to an enterprise-level
distributed OLAP database oriented to massive data analysis based on the
massively parallel processing (MPP) architecture.
Ease of use
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1404
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1405
Huawei Cloud Stack
Solution Description 15 EI Services
The data warehouse is the pillar of the Business Intelligence (BI) system for
collecting, storing, and analyzing massive amounts of data. It provides
powerful business analysis support for IoT, mobile Internet, gaming, and
Online to Offline (O2O) industries.
Advantages of GaussDB(DWS) are as follows:
– Data migration: efficient and real-time data import in batches from
multiple data sources
– High performance: cost-effective PB-level data storage and second-level
response to correlation analysis of trillions of data records
– Real-time: real-time consolidation of service data for timely optimization
and adjustment of operation decision-making
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1406
Huawei Cloud Stack
Solution Description 15 EI Services
● E-commerce
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1407
Huawei Cloud Stack
Solution Description 15 EI Services
15.2.4 Functions
GaussDB(DWS) enables you to use this service through various methods, such as
the GaussDB(DWS) management console, GaussDB(DWS) client, and REST APIs.
This section describes the main functions of GaussDB(DWS).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1408
Huawei Cloud Stack
Solution Description 15 EI Services
● Supports SQL 92 and SQL 2003 standards, stored procedures, GBK and UTF-8
character sets, and SQL standard functions and OLAP analysis functions.
● Compatible with the PostgreSQL ecosystem and supports interconnection with
mainstream database ETL and BI tools provided by third-party vendors.
● Supports roaring bitmaps and common functions used with them, which are
widely used for user feature extraction, user profiling, and more applications
in the Internet, retail, education, and gaming industries.
● List partitioning (PARTITION BY LIST (partition_key,[...])) and range
partitioning are supported.
● Read-only HDFS and OBS foreign tables in JSON file format are supported.
● Permissions on system catalogs can be granted to common users. The
VACUUM permission can be granted separately. Roles with predefined,
extensible permissions are supported, including:
– ALTER, DROP and VACUUM permissions at table level
– ALTER and DROP permissions at schema level
– Preset roles role_signal_backend and role_read_all_stats
Cluster Management
A data warehouse cluster contains nodes with the same flavor in the same subnet.
These nodes jointly provide services. GaussDB(DWS) provides a professional,
efficient, and centralized management console, allowing you to quickly apply for
clusters, easily manage data warehouses, and focus on data and services.
● Creating Clusters
To use data warehouse services on the cloud, create a GaussDB(DWS) cluster
first. You can select product and node specifications to quickly create a cluster.
● Managing Snapshots
A snapshot is a complete backup that records point-in-time configuration
data and service data of a GaussDB(DWS) cluster. A snapshot can be used to
restore a cluster at a certain time. You can manually create snapshots for a
cluster or enable automated snapshot creation (periodic). Automated
snapshots have a limited retention period. You can copy automatic snapshots
for long-term retention.
When you restore a cluster from a snapshot, the system creates a new cluster
with the same flavor and node quantity as the original one, and imports the
snapshot data.
You can delete snapshots that are no longer needed to release the storage
space.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1409
Huawei Cloud Stack
Solution Description 15 EI Services
● Managing nodes
You can check the nodes in a cluster, including the status, specifications, and
usage of each node. To prepare for a large scale-out, you can add nodes in
batches. For example, if 180 more BMS nodes are needed, add them in three
batches (60 for each batch). If some nodes fail to be added, add them again.
After all the 180 nodes are successfully added, use the nodes for cluster scale-
out. Adding nodes does not affect cluster services.
● Scaling out clusters
As the service volume increases, the current scale of a cluster may not meet
service requirements. In this case, you can scale out the cluster by adding
compute nodes to it. Services are not interrupted during the scale-out. You
can enable online scale-out and automatic redistribution if necessary.
● Managing redistribution
By default, redistribution is automatically started after cluster scale-out. For
enhanced reliability, disable the automatic redistribution function and
manually start a redistribution task after the scale-out is successful. Data
redistribution can accelerate service response. Currently, offline redistribution,
online redistribution, and offline scheduling are supported. The default mode
is offline redistribution.
● Managing workloads
When multiple database users query jobs at the same time, some complex
queries may occupy cluster resources for a long time, affecting the
performance of other queries. For example, a group of database users
continuously submit complex and time-consuming queries, while another
group of users frequently submit short queries. In this case, short queries may
have to wait in the queue for the time-consuming queries to complete. To
improve efficiency, you can use the GaussDB(DWS) workload management
function to handle such problems. GaussDB(DWS) workload management
uses workload queues as resource bearers. You can create different workload
queues for different service types and configure different resource ratios for
these queues. Then, add database users to the corresponding queues to
restrict their resource usages.
● Logical cluster
A physical cluster can be divided into logical clusters that use the node-group
mechanism. Tables in a database can be allocated to different physical nodes
by logical cluster. A logical cluster can contain tables from multiple databases.
● Restarting clusters
Restarting a cluster may cause data loss in running services. If you have to
restart a cluster, ensure that there is no running service and all data has been
saved.
● Deleting Clusters
You can delete a cluster when you do not need it. Deleting a cluster is risky
and may cause data loss. Therefore, exercise caution when performing this
operation.
● Management console
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1410
Huawei Cloud Stack
Solution Description 15 EI Services
APIs
You can call standard APIs, such as JDBC and ODBC, to access databases in
GaussDB(DWS) clusters.
For details, see "Using the JDBC and ODBC Drivers to Connect to a Cluster" in the
Data Warehouse Service (DWS) User Guide.
High Reliability
● Supports instance and data redundancy, ensuring zero single points of failure
(SPOF) in the entire system.
● Supports multiple data backups, and all data can be manually backed up to
OBS.
● Automatically isolates the faulty node, uses the backup to restore data, and
replaces the faulty node when necessary.
● Automatic snapshots work with OBS to implement cross-AZ disaster recovery
(DR). If the production cluster fails to provide read and write services due to
natural disasters in the specified region or cluster internal faults, the DR
cluster becomes the production cluster to ensure service continuity.
● In the Unbalanced state, the number of primary instances on some nodes
increases. As a result, the load pressure is high. In this case, you can perform a
primary/standby switchback for the cluster during off-peak hours to improve
performance.
● If the internal IP address or EIP of a CN is used to connect to a cluster, the
failure of this CN will lead to cluster connection failure. To avoid single-CN
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1411
Huawei Cloud Stack
Solution Description 15 EI Services
Security Management
● Isolates tenants and controls access permissions to protect the privacy and
data security of systems and users based on the network isolation and
security group rules, as well as security hardening measures.
● Supports SSL network connections, user permission management, and
password management, ensuring data security at the network, management,
application, and system layers.
For details, see "Configuring SSL Connection" and "Configuring Separation of
Permissions" in the Data Warehouse Service (DWS) User Guide.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1412
Huawei Cloud Stack
Solution Description 15 EI Services
● gsql
gsql is a command line SQL client tool running on the Linux operating system.
It helps connect to, operate, and maintain the database in a data warehouse
cluster.
● Data Studio
Data Studio is a Graphical User Interface (GUI) SQL client tool running on the
Windows operating system. It is used to connect to the database in a data
warehouse cluster, manage the database and database objects, edit, run, and
debug SQL scripts, and view the execution plans.
● GDS
GDS is a data service tool provided by GaussDB(DWS). It works with the
foreign table mechanism to implement high-speed data import and export.
The GDS tool package needs to be installed on the server where the data
source file is located. This server is called the data server or the GDS server.
● DSC SQL syntax migration tool
The DSC is a command-line tool running on the Linux or Windows OS. It is
dedicated to providing customers with simple, fast, reliable application SQL
script migration services. It parses SQL scripts of source database applications
by using the built-in syntax migration logic, and migrates them to be
applicable to GaussDB(DWS) databases.
The DSC can migrate SQL scripts of Teradata, Oracle, Netezza, MySQL, and
DB2 databases.
● gs_dump and gs_dumpall
gs_dump exports a single database or its objects. gs_dumpall exports all
databases or global objects in a cluster.
To migrate database information, you can use a tool to import the exported
metadata to a target database.
● gs_restore
During database migration, you can export files using gs_dump tool and
import them to GaussDB(DWS) by using gs_restore. In this way, metadata,
such as table definitions and database object definitions, can be imported.
15.2.5 Concepts
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1413
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1414
Huawei Cloud Stack
Solution Description 15 EI Services
Accessing a Cluster
GaussDB(DWS) provides a web-based management console and HTTPS-compliant
APIs for you to manage data warehouse clusters.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1415
Huawei Cloud Stack
Solution Description 15 EI Services
The following figure shows the end-to-end data analysis process. Services in use
during each process are also displayed.
15.2.7 Restrictions
● You can manage clusters only and cannot directly access nodes in a cluster.
You can use a cluster's IP address and port to access the database in the
cluster.
● Currently, you can only modify the specifications of cloud data warehouse
clusters and stream data warehouse clusters that only use ECS and EVS
resources for computing and storage. If your cluster contains other computing
or storage resources but you want to change to a higher node flavor, create a
new cluster.
● If you use a client to connect to a cluster, its VPC subnet must be the same as
that of the cluster.
● If you copy commands from the document to the operating environment, the
text wraps automatically, causing command execution failures. To solve the
problem, delete the line break.
Context
GaussDB(DWS) depends on services such as Elastic Load Balance (ELB) and Object
Storage Service (OBS). This section describes the constraints on using DWS
without ELB or OBS.
Function Support
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1416
Huawei Cloud Stack
Solution Description 15 EI Services
Function Support
Audit log Users cannot record the audit logs of specific operations,
storage involving audit log retention policies, unauthorized access, as
well as DML, DDL, SELECT and COPY operations performed on
stored procedures and database objects. Key operations, such
as cluster creation and restart, cannot be recorded on the
management console.
Load snapshot Users cannot create load snapshots to record the cluster load
data in a specified period.
An ELB distributes access traffic to multiple ECSs for traffic control based on
forwarding policies. It improves the fault tolerance capability of application
programs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1417
Huawei Cloud Stack
Solution Description 15 EI Services
Data capacity 10 PB 10 PB 20 PB 20 PB
Size of a 1 PB 1 PB 1 PB 1 PB
single table
Size of data in 1 GB 1 GB 1 GB 1 GB
each row
Size of a 1 GB 1 GB 1 GB 1 GB
single column
in each record
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1418
Huawei Cloud Stack
Solution Description 15 EI Services
Number of 32 32 32 32
columns in
the index of
each table
Size of each 1 PB 1 PB 1 PB 1 PB
partition in a
partitioned
table
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1419
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1420
Huawei Cloud Stack
Solution Description 15 EI Services
As shown in the figure, DataArts Studio is based on the data lake base and
provides capabilities such as data integration, development, and governance.
DataArts Studio can connect to data lakes and cloud database services, such as
MRS Hive and GaussDB(DWS). These data lakes and cloud database services are
used as the data lake base. DataArts Studio can also connect to traditional
enterprise data warehouses, such as Oracle and MySQL.
DataArts Studio consists of the following functional modules:
● Management Center
Management Center supports data connection management and connects to
the data lake base for activities such as data developmentand data
governance.
● DataArts Migration
DataArts Migration supports data migration between 20+ data sources and
integration of data sources into the data lake. It provides wizard-based
configuration and management and supports single table, entire database,
incremental, and periodic data integration.
● DataArts Architecture
DataArts Architecture helps you plan the data architecture, customize models,
unify data standards, visualize data modeling, and label data. DataArts
Architecture defines how data will be processed and utilized to solve business
problems and enables you to make informed decisions.
● DataArts Factory
DataArts Factory helps you build a big data processing center, create data
models, integrate data, develop scripts, and orchestrate workflows.
● DataArts Quality
DataArts Quality monitors the data quality in real time with data lifecycle
management and generates real-time notifications on abnormal events.
● DataArts Catalog
DataArts Catalog provides enterprise-grade metadata management to help
you better know your data assets. A data map shows the lineage of your data
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1421
Huawei Cloud Stack
Solution Description 15 EI Services
and allows you to have a global view of your data assets. Data search,
operations, and monitoring are smarter than before.
● DataArts DataService
DataArts DataService is a platform where you can develop, test, and deploy
your data services. It ensures agile response to data service needs, easier data
retrieval, better experience for data consumers, higher efficiency, and better
monetization of data assets.
● DataArts Security
DataArts Security provides all-round protection for enterprises' data. It
provides access permission management, sensitive data identification, and
privacy protection management to help you establish a security warning
mechanism, improve the overall security protection capability, and ensure
data availability and security compliance.
Workspace
A workspace enables admins to manage member permissions, resources, and
configurations of the underlying compute engines.
The workspace is a basic unit for member management as well as role and
permission assignment. Each team must have an independent workspace.
You can access the Management Center, DataArts Catalog, DataArts Quality,
DataArts Architecture, DataArts DataService, DataArts Factory, and DataArts
Migration modules, but only after your account is added to a workspace and
assigned the permissions required to perform such operations.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1422
Huawei Cloud Stack
Solution Description 15 EI Services
CDM Cluster
A CDM cluster run on an ECS. You can create data migration tasks in a CDM
cluster and migrate data between homogeneous or heterogeneous data sources in
the cloud and on-premises data center.
Data Source
A data source is a medium for storing or processing data, such as a relational
database, data warehouse, and data lake. Different data sources use different data
storage, transmission, processing, and application modes, as well as different
scenarios, technologies, and tools.
Source Data
Source data is the data that is not processed after created. In data management,
source data refers to the data directly from source files (such as service system
databases, offline files, and IoT files) or copies of source files.
Data Connection
A data connection is a collection of details required for accessing where data is
stored, including the connection type, name, and login information.
Concurrency
Concurrency refers to the maximum number of threads that can be concurrently
read from the source in a data integration job.
Dirty Data
Dirty data refers to the data meaningless to business or in invalid format. For
example, if the source data of the VARCHAR type is not properly converted, it
cannot be written to the destination column of the INT type.
Node
A node is a definition for the actions to be performed on your data. For example,
you can use the MRS Spark node to execute predefined Spark jobs in MRS.
Solution
A solution is a series of convenient and systematic management operations that
meet service requirements and objectives. Each solution can contain one or more
business-related jobs, and each job can be reused by multiple solutions.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1423
Huawei Cloud Stack
Solution Description 15 EI Services
Resource
A resource is the self-defined code or text file that you upload. It is invoked when
nodes run.
Environment Variable
An environmental variable is an object with a specific name in the operating
system. It contains information to be used by one or more applications.
PatchData
PatchData is an instance that was generated in the past by a repeatedly scheduled
job.
Data Governance
Data governance is the process by which you can manage, utilize, and protect
your enterprise data throughout the data lifecycle. It includes access control, data
quality management, and risk management.
Data Survey
A data survey involves collecting data that is generated when sorting business
requirements, creating business processes, and classifying data subjects based on
the existing business data and industry status.
Subject Design
Subject design provides hierarchical architectures that help you define and classify
data assets, helping you better understand your data assets and clarify the
relationship between business domains and business objects.
Subject Area
A subject area is a high-level, non-overlapping classification of data used to
manage business objects.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1424
Huawei Cloud Stack
Solution Description 15 EI Services
Business Object
A business object includes important information about people, events, and things
that are indispensable to your enterprise's operations and management.
Process Design
Process design is to generate a structured framework of data processing process,
including the categories, levels, boundaries, scope, and input/output relationships,
and reflect the business models and characteristics of your enterprise.
Data Standard
A data standard is the description of data meanings and business rules that must
be complied with by your enterprise. It describes the common understanding of
certain data at the company level.
Lookup Table
A lookup table includes a series of allowed values and additional text descriptions
that are generally associated with data standards to generate a range of values for
the verification of quality monitoring rules.
SDI
Source Data Integration (SDI) copies data from source systems.
DWI
Data Warehouse Integration (DWI) integrates and cleanses data from multiple
source systems, and builds ER models based on the third normal form (3NF).
DWR
Data Warehouse Report (DWR) is based on multi-dimensional models and its data
granularity is the same as that of DWI.
DM
Data Mart (DM) is where multiple types of data are summarized and displayed.
ER Modeling
Entity Relationship (ER) modeling describes business activities of an enterprise. ER
models are compliant with the third normal form (3NF). You can use ER models
for data integration, which merges and classifies data from different systems by
similarity or subject. However, you cannot use ER models for decision-making.
Dimensional Modeling
A dimensional model is generally created for data analysis and decision-making.
Its aim is to complete the analysis of complex and multiple user requirements at
full speed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1425
Huawei Cloud Stack
Solution Description 15 EI Services
Measure
A measure is a quantifiable value used to measure business situations. It usually
refers to a number, for example, an amount, quantity, or period. Measures are
numerical values that do not have explicit business relevance, but they can be
converted into metrics in a business context.
Dimension
A dimension is used to observe and analyze business data. It supports data
aggregation, drilling, and slicing analysis and is used as the GROUP BY condition
in SQL statements. Most dimensions have a hierarchical structure, for example,
geographic dimension (including country, region, province, and city levels) and
time dimension (including annually, quarterly, and monthly levels).
Atomic Metric
An atomic metric is generated based on dimension tables and fact tables of a
multidimensional model. The business objects and the finest data granularity of
an atomic metric are consistent with those of the multidimensional model. An
atomic metric usually consists of measures and attributes related with measures
and business objects, all of which aim to support agile self-service consumption of
derivative metrics, for example, the number of retail stores (including the store
names and levels).
Derivative Metric
A derivative metric is derived from the combination of modifiers, standards,
dimensions, and atomic metrics. Modifiers, standards, and definitions are usually
the attributes of an atomic metric. An example is the in-store promoter coverage.
Compound Metric
A compound metric is generated by derivative metrics. The dimensions and
modifiers of a compound metric are the same as those of the derivative metric.
(No new dimensions and modifiers for a compound metric can be generated if its
derivative metric has no dimensions and modifiers.)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1426
Huawei Cloud Stack
Solution Description 15 EI Services
Data Asset
A data asset is a resource that is owned or controlled by your enterprise and can
be monetized in the future. The data resource is recorded in physical or electronic
mode. Not all the data of your enterprise can be considered as a data asset. A
data asset must be a data resource that can generate value for your enterprise.
Data Map
A data map is a data search-driven tool that displays the source, quality,
distributions, standards, flow directions, and relationships of data in graphical
forms. You can use a data map to easily find, read, and consume data.
Metadata
Metadata is data about data. Specifically, it is information about the organization,
domain, and relationships of data. Metadata includes metadata entities and
metadata elements. A metadata element is a basic unit of metadata, and several
related metadata elements form a metadata entity.
Metadata Collection
You can customize a collection policy to collect technical metadata from data
sources.
DataArts DataService
DataArts DataService provides data as a product based on data distribution and
release frameworks. The product provided meets your requirements for real-time
data and industry standards. It can be reused and shared securely.
API Gateway
API Gateway provides API hosting services through the API gateway, covering the
full life-cycle management of API release, management, O&M, and sales. It helps
you easily implement microservice aggregation, frontend and backend separation,
system integration, and open functions and data to partners and developers in a
quick, cost-effective, but low risky way.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1427
Huawei Cloud Stack
Solution Description 15 EI Services
15.3.3 Functions
You can manage data on the wizard-based task management page. You can easily
create data migration tasks that meet your requirements. DataArts Migration
provides the following functions:
● Table/File/Entire DB migration
You can migrate tables or files in batches, and migrate an entire database
between homogeneous and heterogeneous database systems. You can include
hundreds of tables in a single job.
● Incremental data migration
You can migrate files, relational databases, and HBase in an incremental
manner. You can perform incremental data migration by using WHERE clauses
and variables of date and time.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1428
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1429
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1430
Huawei Cloud Stack
Solution Description 15 EI Services
use ER models for data integration, which merges and classifies data
from different systems by similarity or subject. However, you cannot use
ER models for decision-making.
– Dimensional modeling
Dimensional modeling involves constructing bus matrices to extract
business facts and dimensions for model creation. You need to sort out
business requirements for constructing metric systems and creating
summary models.
DataArts Factory allows you to manage data, develop scripts, and schedule and
monitor jobs. Data analysis and processing are easier than ever before.
● Data management
– You can manage multiple types of data warehouses, such as GaussDB
(DWS) and MRS Hive.
– You can use the graphical interface and data definition language (DDL)
to manage database tables.
● Script development
– Provides an online script editor that allows more than one operator to
collaboratively develop and debug SQL, Python, and Shell scripts online.
– You can use Variables.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1431
Huawei Cloud Stack
Solution Description 15 EI Services
● Job development
– DataArts Factory provides a graphical designer that allows you to rapidly
develop workflows through drag-and-drop and build data processing
pipelines.
– DataArts Factory is preset with multiple task types such as data
integration, SQL, and Shell. Data is processed and analyzed based on task
dependencies.
– You can import and export jobs.
● Resource management
You can centrally manage file, jar, and archive resources used during script
and job development.
● Job scheduling
– You can schedule jobs to run once or recursively and use events to trigger
scheduling jobs.
– Job scheduling supports a variety of hybrid orchestration tasks. The high-
performance scheduling engine has been tested by hundreds of
applications.
● O&M and monitoring
– You can run, suspend, restore, or terminate a job.
– You can view the operation details of each job and each node in the job.
– You can use various methods to receive notifications when a job or task
error occurs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1432
Huawei Cloud Stack
Solution Description 15 EI Services
● Data map
Data maps facilitate data search, analysis, development, mining, and
operations. They provide lineage information and impact analysis. Data maps
make data search easier and faster than before.
– Keyword search and fuzzy search are supported, helping you quickly
locate the data you need.
– You can search for tables by name. Table details are displayed as soon as
the matching table is found. You can also add more descriptions for the
searched table.
– Data maps display the source, destination, and processing logic of a table
field.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1433
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1434
Huawei Cloud Stack
Solution Description 15 EI Services
15.3.4 Advantages
One-Stop Data Operations Platform
DataArts Studio is a one-stop data operations platform that allows you to perform
many operations, including integrating data from every domain, designing data
architecture, monitoring data quality, managing data assets centrally, developing
data services, and connecting data from different data sources. In a word, it can
help you build a comprehensive data governance solution.
The visualized task O&M center monitors all tasks and supports notification
settings, enabling you to obtain real-time task status and ensuring normal running
of services.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1435
Huawei Cloud Stack
Solution Description 15 EI Services
management is also visual and allows you to perform data drilling and source
tracing.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1436
Huawei Cloud Stack
Solution Description 15 EI Services
Advantages
Advantages
● Industry-tailored solutions
Custom solutions for government, taxation, smart city, smart transportation,
and smart campus
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1437
Huawei Cloud Stack
Solution Description 15 EI Services
● Standards compliance
Compliance of layered industry data standards
● Various domain models
A variety of industry domain models developed from eight types of data,
which are people, organization, event, spatio-temporal, vehicle, asset, device,
and resource data, and their relationships
● Quick utilization of industry libraries
Quick utilization of industry-specific subject libraries, algorithm libraries, and
metric libraries
Table 15-47 Recommended application scenarios for each DataArts Studio version
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1438
Huawei Cloud Stack
Solution Description 15 EI Services
Standard Large enterprises and bureaus with big data, without data
(large) governance requirements
Platinum Large enterprises and bureaus with big data, with hundreds of
(large) thousands of data tables required for data governance.
DataArts Migration √ √
Management Center √ √
DataArts Architecture x √
DataArts Factory √ √
DataArts Quality x √
DataArts Catalog x √
DataArts DataService x √
DataArts Security x √
Data Maps x √
Table 15-49 DataArts Studio version specifications (all shared DataArts Studio instances in the
region)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1439
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
If you need an incremental package to meet service growth, you can create the incremental
package on the console.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1440
Huawei Cloud Stack
Solution Description 15 EI Services
DataArts Studio User Users with the DataArts Studio User System-
policy have the permissions of the role defined
assigned to them in a workspace. role
Users with the DataArts Studio User
policy have the permissions of the role
assigned to them in a workspace. DataArts
Studio workspace roles include the preset
admin, developer, deployer, operator, and
viewer, and other custom roles. For details
about the operation permissions of each
role, see 15.3.8 DataArts Studio
Permissions.
● Admin: Users with this role have the
permissions to perform all operations in
a workspace. You are advised to assign
this role to the project owner,
development owner, and O&M
administrator.
● Developer: Users with this role have the
permissions to create and manage work
items, but cannot perform operations
on workspaces, clusters, and reviewers.
You are advised to assign this tole to
users who develop and process tasks.
● Deployer: Users with this role have the
permission to view release packages
and release item lists, release packages,
and cancel release on the DataArts
Studio console, but cannot perform
operations on workspaces and
reviewers. In enterprise mode, when a
developer submits a script or job
version, the system generates a release
task. After the developer confirms the
release and the deployer approves the
release request, the modified job is
synchronized to the production
environment.
● Operator: Users with this role have the
permissions to perform operations such
as O&M and scheduling, but cannot
modify work items or configurations.
You are advised to assign this role to
users for O&M management and status
monitoring.
● Viewer: Users with this role can only
read data from DataArts Studio, but
cannot perform operations on
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1441
Huawei Cloud Stack
Solution Description 15 EI Services
After a role is granted to you, you have all the permissions of the role. For details
about how to authorize a DataArts Studio role, see "Creating an IAM User and
Assigning DataArts Studio Permissions" in "Preparations" in DataArts Studio User
Guide 2.10.0 (for Huawei Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1442
Huawei Cloud Stack
Solution Description 15 EI Services
NOTICE
Management Center
Permission Admin Developer Operator Viewer
Querying the Y Y Y Y
MRS, DWS, or
CDM cluster list
Creating Y Y N N
databases
Deleting Y Y N N
databases
Querying Y Y Y Y
databases
Modifying Y Y N N
databases
Creating data Y Y N N
tables
Deleting data Y Y N N
tables
Querying data Y Y Y Y
tables
Editing data Y Y N N
tables
Creating Y Y N N
resource
migration tasks
Operating Y Y Y N
resource
migration tasks
Querying Y Y Y Y
resource
migration tasks
Creating data Y Y N N
connections
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1443
Huawei Cloud Stack
Solution Description 15 EI Services
Deleting data Y Y N N
connections
Operating data Y Y Y N
connections
Querying data Y Y Y Y
connections
Editing data Y Y N N
connections
Deleting RDS Y N N N
driver packages
Operating RDS Y N N N
driver packages
Querying RDS Y Y Y Y
driver packages
Creating DLI N N N N
resource
mapping
configurations
Deleting DLI N N N N
resource
mapping
configurations
Querying DLI N N N N
resource
mapping
configurations
DataArts Architecture
Permission Admin Developer Operator Viewer
Creating atomic Y Y N N
metrics
Deleting atomic Y Y N N
metrics
Querying atomic Y Y Y Y
metrics
Editing atomic Y Y N N
metrics
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1444
Huawei Cloud Stack
Solution Description 15 EI Services
Creating logical Y Y N N
entities or
physical tables
Deleting logical Y Y N N
entities or
physical tables
Querying logical Y Y Y Y
entities or
physical tables
Editing logical Y Y N N
entities or
physical tables
Creating Y N N N
configuration
centers
Deleting Y N N N
configuration
centers
Querying Y Y Y Y
configuration
centers
Editing Y N N N
configuration
centers
Creating subject Y Y N N
designs
Deleting subject Y Y N N
designs
Querying subject Y Y Y Y
designs
Editing subject Y Y N N
designs
Creating business Y Y N N
metrics
Deleting business Y Y N N
metrics
Querying Y Y Y Y
business metrics
Editing business Y Y N N
metrics
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1445
Huawei Cloud Stack
Solution Description 15 EI Services
Creating Y Y N N
summary tables
Deleting Y Y N N
summary tables
Querying Y Y Y Y
summary tables
Editing summary Y Y N N
tables
Creating general Y Y N N
configurations
Deleting general Y Y N N
configurations
(deleting the
drafts of
published logical
entities or tables)
Operating Y Y Y N
general
configurations
(importing,
exporting,
publishing,
suspending,
synchronizing,
and reversing
logical entities or
tables)
Querying general Y Y Y Y
configurations
(querying the
drafts of
published logical
entities or tables)
Editing general Y Y N N
configurations
(editing the
drafts of
published logical
entities or tables)
Deleting Y Y N N
dimension tables
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1446
Huawei Cloud Stack
Solution Description 15 EI Services
Querying Y Y Y Y
dimension tables
Creating process Y Y N N
designs
Deleting process Y Y N N
designs
Querying process Y Y Y Y
designs
Editing process Y Y N N
designs
Creating lookup Y Y N N
tables
Deleting lookup Y Y N N
tables
Querying lookup Y Y Y Y
tables
Editing lookup Y Y N N
tables
Creating models Y Y N N
Deleting models Y Y N N
Querying models Y Y Y Y
Editing models Y Y N N
Creating Y Y N N
derivative or
compound
metrics
Deleting Y Y N N
derivative or
compound
metrics
Operating Y Y N N
derivative or
compound
metrics
Querying Y Y Y Y
derivative or
compound
metrics
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1447
Huawei Cloud Stack
Solution Description 15 EI Services
Editing derivative Y Y N N
or compound
metrics
Creating Y Y N N
associated
quality rules
Deleting Y Y N N
associated
quality rules
Querying Y Y Y Y
associated
quality rules
Editing Y Y N N
associated
quality rules
Creating fact Y Y N N
tables
Deleting fact Y Y N N
tables
Querying fact Y Y Y Y
tables
Editing fact Y Y N N
tables
Creating Y Y N N
directories
Deleting Y Y N N
directories
Querying Y Y Y Y
directories
Editing Y Y N N
directories
Creating Y Y N N
dimensions
Deleting Y Y N N
dimensions
Querying Y Y Y Y
dimensions
Editing Y Y N N
dimensions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1448
Huawei Cloud Stack
Solution Description 15 EI Services
Creating time Y Y N N
filters
Deleting time Y Y N N
filters
Querying time Y Y Y Y
filters
Editing time Y Y N N
filters
Creating data Y Y N N
standards
Deleting data Y Y N N
standards
Querying data Y Y Y Y
standards
Editing data Y Y N N
standards
DataArts Migration
Permission Admin Developer Operator Viewer
Creating clusters Y Y N N
Deleting clusters Y Y N N
Operating Y Y Y N
clusters
Querying clusters Y Y Y Y
Editing clusters Y Y N N
Operating links Y Y Y N
Querying links N N N N
Operating jobs Y Y Y N
Querying jobs N N N N
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1449
Huawei Cloud Stack
Solution Description 15 EI Services
DataArts Factory
Permission Admin Developer Deploye Operator Viewer
r
Creating Y Y N N N
schemas
Deleting Y Y N N N
schemas
Querying Y Y N Y Y
schemas
Editing schemas Y Y N N N
Operating Y Y N Y N
backups
Querying Y Y N Y Y
backups
Creating Y Y N N N
PatchData tasks
Operating Y Y N Y N
PatchData tasks
Querying Y Y N Y Y
PatchData tasks
Operating dirty Y Y N Y N
data
Operating Y N N Y N
backups used
for restoration
Querying Y Y N Y Y
backups used
for restoration
Creating Y Y N N N
directories
Deleting Y Y N N N
directories
Querying Y Y N Y Y
directories
Editing Y Y N N N
directories
Creating Y Y N N N
notifications
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1450
Huawei Cloud Stack
Solution Description 15 EI Services
Deleting Y Y N N N
notifications
Querying Y Y N Y Y
notifications
Editing Y Y N N N
notifications
Creating Y Y N N N
databases
Deleting Y Y N N N
databases
Querying Y Y N Y Y
databases
Editing Y Y N N N
databases
Creating Y Y N N N
solutions
Deleting Y Y N N N
solutions
Operating Y Y N Y N
solutions
Querying Y Y N Y Y
solutions
Editing Y Y N N N
solutions
Querying IAM Y Y Y Y Y
agencies
Updating IAM Y N N N N
agencies
Operating Y Y N N N
environment
variables
Querying Y Y N Y Y
environment
variables
Editing Y Y N N N
environment
variables
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1451
Huawei Cloud Stack
Solution Description 15 EI Services
Operating job Y Y N Y N
nodes
Viewing release Y Y Y Y Y
packages
Operating Y N Y Y N
release
packages
Creating data Y Y N N N
connections
Deleting data Y Y N N N
connections
Operating data Y Y N Y N
links
Querying data Y Y N Y Y
connections
Editing data Y Y N N N
connections
Canceling Y Y Y Y N
release
Creating data Y Y N N N
tables
Deleting data Y Y N N N
tables
Querying data Y Y N Y Y
tables
Editing data Y Y N N N
tables
Operating job Y Y N Y N
instances
Querying job Y Y N Y Y
instances
Creating Y Y N N N
resources
Deleting Y Y N N N
resources
Operating Y Y N Y N
resources
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1452
Huawei Cloud Stack
Solution Description 15 EI Services
Querying Y Y N Y Y
resources
Editing Y Y N N N
resources
Editing N N N N N
environment
variable
mappings
Operating script Y Y N Y N
editing locks
Creating scripts Y Y N N N
Deleting scripts Y Y N N N
Operating Y Y N Y N
scripts
Querying scripts Y Y N Y Y
Editing scripts Y Y N N N
Deleting job Y Y N Y N
tags
Querying job Y Y N Y Y
tags
Creating jobs Y Y N N N
Deleting jobs Y Y N N N
Operating jobs Y Y N Y N
Querying jobs Y Y N Y Y
Editing jobs Y Y N Y N
Querying Y Y N Y Y
details about
job editing locks
Operating job Y Y N Y N
editing locks
Creating Y N N Y N
baselines
Querying Y Y N Y N
baselines
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1453
Huawei Cloud Stack
Solution Description 15 EI Services
Deleting Y N N Y N
baselines
Modifying Y N N Y N
baselines
Querying Y Y N Y N
baseline
instances
Obtaining the Y Y N Y N
list of summary
information
about assurance
jobs
Querying events Y Y N Y N
Updating Y N N Y N
events
DataArts Quality
Permission Admin Developer Operator Viewer
Querying the Y Y Y Y
dashboard
Operating Y Y Y N
instances
Querying Y Y Y Y
instances
Creating rule Y N N N
templates
Deleting rule Y N N N
templates
Operating rule Y N N N
templates
Querying rule Y Y Y Y
templates
Editing rule Y N N N
templates
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1454
Huawei Cloud Stack
Solution Description 15 EI Services
Querying the Y Y N N
execution result
Creating rules Y Y N N
Deleting rules Y Y N N
Operating rules Y Y Y N
Querying rules Y Y Y Y
Editing rules Y Y N N
Editing quality Y N N N
scores
Creating Y Y N N
directories
Deleting Y Y N N
directories
Querying Y Y Y Y
directories
Editing Y Y N N
directories
Querying the Y Y Y Y
dashboard
Operating Y Y Y N
instances
Querying Y Y Y Y
instances
Creating Y Y N N
scenarios
Deleting Y Y N N
scenarios
Operating Y Y Y N
scenarios
Querying Y Y Y Y
scenarios
Editing scenarios Y Y N N
Creating metrics Y Y N N
Deleting metrics Y Y N N
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1455
Huawei Cloud Stack
Solution Description 15 EI Services
Querying metrics Y Y Y Y
Editing metrics Y Y N N
Creating rules Y Y N N
Deleting rules Y Y N N
Querying rules Y Y Y Y
Editing rules Y Y N N
Creating Y Y N N
directories
Deleting Y Y N N
directories
Querying Y Y Y Y
directories
Editing Y Y N N
directories
DataArts Catalog
Permission Admin Developer Operator Viewer
Querying data Y Y Y N
sources
Operating task Y Y Y N
instances
Querying task Y Y Y Y
instances
Creating Y Y N N
collection tasks
Deleting Y Y N N
collection tasks
Operating Y Y Y N
collection tasks
Querying Y Y Y Y
collection tasks
Editing collection Y Y N N
tasks
Editing approvals Y Y N N
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1456
Huawei Cloud Stack
Solution Description 15 EI Services
Editing asset Y Y N N
reports
Creating tags Y Y N N
Deleting tags Y Y N N
Querying tags Y Y Y Y
Editing tags Y Y N N
Creating assets Y Y N N
Deleting assets Y Y N N
Operating assets Y Y Y N
Querying assets Y Y Y Y
Editing assets Y Y N N
Creating Y Y N N
directories
Deleting Y Y N N
directories
Querying Y Y Y Y
directories
Editing Y Y N N
directories
Creating Y Y N N
classifications
Deleting Y Y N N
classifications
Querying Y Y Y Y
classifications
Editing Y Y N N
classifications
Creating data Y N N N
permission rules
Deleting data Y N N N
permission rules
Querying data Y Y Y Y
permission rules
Editing data Y N N N
permission rules
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1457
Huawei Cloud Stack
Solution Description 15 EI Services
DataArts DataService
Permission Admin Developer Operator Viewer
Creating Y Y N N
throttling policies
Deleting Y Y N N
throttling policies
Operating Y Y Y N
throttling policies
Querying Y Y Y Y
throttling policies
Editing throttling Y Y N N
policies
Creating Y Y N N
applications
Deleting Y Y N N
applications
Operating Y Y Y N
applications
Querying Y Y Y Y
applications
Editing Y Y N N
applications
Operating Y Y Y N
reviews
Querying reviews Y Y Y Y
Creating API Y Y Y N
catalogs
Deleting API Y Y Y N
catalogs
Querying API Y Y Y Y
catalogs
Editing API Y Y Y N
catalogs
Operating Y Y N N
clusters
Querying clusters Y Y Y Y
Adding reviewers Y N N N
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1458
Huawei Cloud Stack
Solution Description 15 EI Services
Deleting Y N N N
reviewers
Operating Y Y Y N
reviewers
Querying Y Y Y N
reviewers
Creating APIs Y Y N N
Deleting APIs Y Y N N
Operating APIs Y Y Y N
Querying APIs Y Y Y Y
Editing APIs Y Y N N
Querying data Y Y N N
sources
Querying the Y Y Y Y
dashboard
DataArts Security
Permission Admin Developer Operator Viewer
Querying the Y Y Y Y
dashboard
Creating data Y Y N N
source tracing
tasks
Deleting data Y Y N N
source tracing
tasks
Operating data Y Y N N
source tracing
tasks
Querying data Y Y Y Y
source tracing
tasks
Editing data Y Y N N
source tracing
tasks
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1459
Huawei Cloud Stack
Solution Description 15 EI Services
Operating Y Y N Y
security task
scheduling
Creating sensitive Y Y Y N
data discovery
tasks
Deleting sensitive Y Y N N
data discovery
tasks
Operating Y Y Y N
sensitive data
discovery tasks
Querying Y Y Y Y
sensitive data
discovery tasks
Editing sensitive Y Y N N
data discovery
tasks
Querying data Y Y Y Y
sources
Creating access Y Y N N
permissions
management
tasks
Deleting access Y Y N N
permissions
management
tasks
Querying access Y Y Y Y
permissions
management
tasks
Editing access Y Y N N
permissions
management
tasks
Querying Y Y N N
resource
permission
configuration
Creating data Y Y N N
masking policies
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1460
Huawei Cloud Stack
Solution Description 15 EI Services
Deleting data Y Y N N
masking policies
Operating data Y Y Y Y
masking policies
Querying data Y Y Y Y
masking policies
Editing data Y Y N N
masking policies
Creating security Y Y N N
levels
Deleting security Y Y N N
levels
Querying security Y Y Y Y
levels
Editing security Y Y N N
levels
Creating rule Y Y Y N
groups
Deleting rule Y Y N N
groups
Operating rule Y Y Y N
groups
Querying rule Y Y Y Y
groups
Editing rule Y Y Y N
groups
Creating data Y Y N N
masking tasks
Deleting data Y Y N N
masking tasks
Operating data Y Y N N
masking tasks
Querying data Y Y Y Y
masking tasks
Editing data Y Y N N
masking tasks
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1461
Huawei Cloud Stack
Solution Description 15 EI Services
Creating data Y Y N N
watermarking
tasks
Deleting data Y Y N N
watermarking
tasks
Operating data Y Y N N
watermarking
tasks
Querying data Y Y Y Y
watermarking
tasks
Editing data Y Y N N
watermarking
tasks
Use Restrictions
Before using DataArts Studio, you must read and understand the following
restrictions:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1462
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1463
Huawei Cloud Stack
Solution Description 15 EI Services
Compo Restriction
nent
DataArt 1. You can enable automatic backup and restoration of CDM jobs.
s Backups of CDM jobs are stored in OBS buckets. For details, see
Migrati DataArts Migration > Job Management > Job Configuration
on Management in DataArts Studio User Guide.
2. The DataArts Migration cluster is deployed in standalone mode. A
cluster fault may cause service and data loss. You are advised to
use the CDM Job node of DataArts Factory to invoke CDM jobs
and select two CDM clusters to improve reliability. For details, see
DataArts Factory > Nodes > CDM Job in DataArts Studio User
Guide.
For more constraints on DataArts Migration, see "DataArts Migration"
> "Constraints" in DataArts Studio User Guide.
DataArt 1. You can enable backup of assets such as scripts and jobs to OBS
s buckets. For details, see DataArts Factory > O&M and Scheduling
Factory > Managing Backups in DataArts Studio User Guide.
2. A maximum of 10,000 jobs can be created in a workspace.
3. A maximum of 1,000 execution results can be displayed for RDS
SQL, DWS SQL, Hive SQL, and Spark SQL scripts, and the data
volume is less than 3 MB. If the number of execution results
exceeds 1,000, you can dump them. A maximum of 10,000
execution results can be dumped.
DataArt 1. The execution duration of data quality jobs depends on the data
s engine. If the data engine does not have sufficient resources, the
Quality execution of data quality jobs may be slow.
2. A maximum of 50 rules can be configured for a data quality job. If
necessary, you can create multiple quality jobs.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1464
Huawei Cloud Stack
Solution Description 15 EI Services
Compo Restriction
nent
DataArt 1. The shared edition is designed only for development and testing.
s You are advised to use the exclusive edition which is superior to
DataSer the shared edition.
vice 2. DataArts DataService clusters are bound to workspaces. After a
cluster is created, its specifications cannot be modified, and its
edition cannot be upgraded.
ECS
CDM and DataArts DataService clusters of DataArts Studio consist of Elastic Cloud
Servers (ECSs). In addition, DataArts Studio can use host connections to connect to
ECSs and run Shell or Python scripts.
VPC
Virtual Private Cloud (VPC) provides isolated network environments for DataArts
Studio.
EIP
Elastic IP (EIP) enables DataArts Studio to communicate with the Internet.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1465
Huawei Cloud Stack
Solution Description 15 EI Services
OBS
DataArts Studio uses Object Storage Service (OBS) buckets to store logs. Some
DataArts Studio functions rely on Object Storage Service (OBS). For the DataArts
Studio functions that are unavailable when OBS is unavailable, see 15.3.12
Restricted Functions.
SMN
DataArts Studio uses Simple Message Notification (SMN) to send push
notifications based on your subscription requirements, so that you can receive
immediate notifications when specific events occur.
NOTE
If the SMN service is unavailable, the notification management function will be unavailable
for DataArts Studio.
Direct Connect
Direct Connect (basic or enhanced) enables DataArts Studio to communicate with
third-party data centers.
MRS
MapReduce Service (MRS) can be used as the data lake for DataArts Studio and
enables data integration, development, and governance.
GaussDB(DWS)
GaussDB(DWS) can be used as the data lake for DataArts Studio and enables data
integration, development, governance, and provisioning.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1466
Huawei Cloud Stack
Solution Description 15 EI Services
----End
Knowledge of Quotas
1. Q: Why do some quota items not support unlimited quotas?
A: Each service has a theoretical load upper limit. If the quota is unlimited,
the service stability cannot be ensured when the service load reaches a certain
threshold.
2. Q: Why is the initial quota displayed as No limited on ManageOne instead of
a specific range?
A: ManageOne supports quota registration, but not quota setting.
3. Q: Why can the quota of DataArts DataService - Exclusive APIs on
ManageOne be lower than the allocated API quota of DataArts DataService
Exclusive, which is defined by API Quota of DataArts DataService Exclusive
in the DataArts Studio workspace?
A: ManageOne manages only resources, and the quota cannot be less than
the number of APIs on ManageOne. DataArts DataService is responsible for
quota allocation to DataArts Studio workspaces. The two quota systems are
independent of each other.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1467
Huawei Cloud Stack
Solution Description 15 EI Services
An API can be created only when both the quota on ManageOne and the
quota in a workspace are not reached.
4. Q: Why is 0 rather than the actual used quota displayed for DataArts
DataService - Exclusive Flow Controls and DataArts DataService -
Exclusive Apps?
A: These quotas vary depending on workspaces, but not enterprise projects.
They apply to all workspaces in an enterprise project. Each workspace has a
different used quota. Therefore, the used quota of an enterprise project
cannot be displayed.
Table 15-54 Restricted functions of the data development module in the non-OBS
scenario
Function Impact
Changing Log Storage Paths Job logs can be stored only in the system
background and cannot be stored in OBS
paths. Job logs are retained for a maximum of
six months.
Viewing the Execution History The execution history of scripts or jobs cannot
be viewed.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1468
Huawei Cloud Stack
Solution Description 15 EI Services
Function Impact
Table 15-55 Restricted functions of the data integration module in the non-OBS
scenario
Function Impact
Table 15-56 Restricted functions of the management center module in the non-
OBS scenario
Function Impact
15.4 ModelArts
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1469
Huawei Cloud Stack
Solution Description 15 EI Services
use ModelArts to train and deploy your models quickly. In addition, ModelArts
enables AI asset sharing with its AI Hub.
● Unified management
– ModelArts provides multiple modes for importing models. You can
manage your models with different frameworks and functions centrally.
– You can access the services deployed using a trained model at high
concurrency and low latency. ModelArts supports gray release.
– There are resource pools with diverse specifications available for you to
choose from.
● Flexible deployment
Models can be deployed as real-time, edge, or batch inference services.
● AI asset sharing
AI Hub provides a secure, open sharing platform for you to take advantage of
shared AI assets such as algorithms, models, and workflows for highly
efficient development.
15.4.2 Concepts
Training
Training is a process of exploring logical relations and internal laws of services by
analyzing pre-processed data with various methods and techniques. The outcome
of training is one or multiple machine or deep learning models, which can be used
to analyze new data and give predictions.
Inference
Inference is a process of deriving a new judgment from a known judgment
according to a certain strategy. In AI, machines simulate human intelligence, and
complete inference based on neural networks.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1470
Huawei Cloud Stack
Solution Description 15 EI Services
Real-Time Inference
In real-time inference, a model can be deployed as a web service that offers real-
time test UI and monitoring.
Batch Inference
A batch inference service applies to batch data. The service automatically stops
after all data is processed.
Edge Inference
Edge inference uses IEF to deploy a model as a web service on an edge node.
Custom Image
ModelArts runs in containers. Custom images are customized container images
running on ModelArts. Custom images support CLI parameters and environment
variables in free-text format, featuring high flexibility for a wide range of compute
engines.
Resource Pool
ModelArts provides large-scale compute clusters for model training and inference.
Public, edge, and dedicated resource pools are available for you to choose from.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1471
Huawei Cloud Stack
Solution Description 15 EI Services
● Public resource pool: A public resource pool is a dedicated resource pool for
ModelArts tenants to deploy real-time and batch services. A public resource
pool is shared by all tenants.
● Dedicated resource pool: A dedicated resource pool can be used to create
training jobs and deploy real-time and batch services. Dedicated resource
pools are created separately and used exclusively.
● Edge resource pool: An edge resource pool is a collection of edge nodes,
which are used to deploy edge services. Edge resource pools are created
separately and used exclusively.
15.4.3 AI Engines
This section describes the common AI engines supported by ModelArts preset
images.
Model Inference
If you import a model from a template, OBS, or a training job to create an AI
application, the AI engines and versions listed in the following table are supported.
If you want to use other engines, you can import a model from a training job or a
container image.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1472
Huawei Cloud Stack
Solution Description 15 EI Services
Model training ● The input data used by training jobs is stored in OBS.
● The codes of training jobs are stored in OBS.
● The models generated by training jobs are stored in the
specified OBS paths.
● The run logs of training jobs are stored in the specified
OBS paths.
SWR
To use an AI framework that is not supported by ModelArts, use SoftWare
Repository for Container (SWR) to customize an image and import the image to
ModelArts for training or inference. For more information about SWR, see
SoftWare Repository for Container (SWR) 23.9.5 Usage Guide (for Huawei
Cloud Stack 8.3.0).
IEF
Intelligent EdgeFabric (IEF) enables ModelArts to deploy models on edge nodes.
For more information about IEF, see Intelligent EdgeFabric (IEF) User Guide (for
Huawei Cloud Stack 8.3.0).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1473
Huawei Cloud Stack
Solution Description 15 EI Services
Functions
GES has the following functions:
● Extensive Algorithms
Algorithms such as PageRank, K-core, Shortest Path, Label Propagation,
Triangle Count, and Link Prediction are all supported.
● Visualized Graph Analysis
A wizard-based graph exploration environment for visual graph analysis and
intuitive query result display, allowing for interactive analysis operations.
● Query/Analysis APIs
GES provides APIs for graph query, metrics statistics, Gremlin query, Cypher
query, graph algorithms, and graph and backup management.
● Good Compatibility
Compatible with open source Apache TinkerPop Gremlin 3.4
● Graph Management
GES provides graph overview, graph management, graph backup, and
metadata management functions.
Accessing GES
A web-based management console and HTTPS-based APIs are available for
accessing GES.
● Using APIs
If you need to integrate GES on the cloud platform into a third-party system
for secondary development, use APIs to access the service.
● Using the management console
To perform other operations, access the GES using the management console.
You can use the VDC administrator account to log in to the management
console.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1474
Huawei Cloud Stack
Solution Description 15 EI Services
Large Scale
Efficient data organization facilitates analysis and querying of graphs with tens of
billions of vertices.
High Performance
Optimized distributed graph processing engine supports high-concurrency, multi-
hop, real-time queries in seconds.
Ease of Use
Wizard-based GUI and compatibility with Gremlin and Cypher facilitate easy graph
analysis.
Internet
GES quickly and effectively mines valuable information from large and complex
social networks in the mobile Internet era.
In this scenario, GES will help you implement the following functions:
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1475
Huawei Cloud Stack
Solution Description 15 EI Services
Knowledge Graph
GES-based knowledge graphs integrate various kinds of heterogeneous data,
enabling larger graph scales and higher performance.
In this scenario, GES will help you implement the following functions:
● Massive Storage
Heterogeneous data points can be integrated and stored as vertices and
edges in graphs.
● Quick Correlation Query
You can perform correlation queries of a massive knowledge base and returns
accurate results within seconds.
● Knowledge Classification
Similar knowledge points are combined based on graph-based analysis and
computing to implement knowledge disambiguation.
● Learning Path Identification and Recommendation
Learning paths can be identified and recommended based on learning
relationships between data points.
Urban Industry
You can better manage the pressure on and balance the loads of urban roads or
pipelines (such as water, gas, power, and oil pipelines) to control traffic networks
and pipelines with more precision.
In this scenario, GES will help you implement the following functions:
● Pipeline Pressure Adjustment
The throughput of and pressure on the entire pipeline networks can be
analyzed based on real-time monitoring data.
● Urban Road Network Control
You can analyze traffic congestion patterns, including traffic, road network,
and intersection monitoring data for the entire urban road network, to
improve traffic flow throughout the city.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1476
Huawei Cloud Stack
Solution Description 15 EI Services
● Path Design
You can design public transportation routes throughout the city based on
real-time monitoring of people and vehicle requests. This data backed route
design increases seat occupancy rates and reduces operating costs.
Enterprise IT
Large scale networks and IT infrastructure can be complicated and hard to
manage. Intelligent device monitoring and management give you a clearer
understanding of your entire network and IT infrastructure.
In this scenario, GES will help you implement the following functions:
● Network Planning
Identifying faulty nodes and recommending backup routers for heavy load
makes network planning easier.
● Fault Cause Analysis
Root causes of any network or infrastructure fault can be located quicker.
● IT Infrastructure Management
Visualized relationships between network devices, including device and
resource statuses, make for more efficient O&M.
Vertex
Vertices represent entities in data models, such as vehicles in traffic networks,
stations in communication networks, users and commodities in e-commerce
transaction networks, and web pages on the Internet.
Edge
Edges represent relationships in data models, such as friend relationships in social
networks, user ratings and purchase behavior in e-commerce transaction
networks, cooperative relationships between authors of papers, and index
relationships between articles.
Gremlin
Gremlin is a graph traversal language in the open source graph calculation
framework of Apache TinkerPop. You can use Gremlin to create, read, update, and
delete (CRUD) data. For example, you can use Gremlin to load data, manage
graphs, and compile complex traversing algorithms.
Cypher
Cypher is a widely used declarative query language for graph databases. Cypher
uses graph statistics and label-based vertex and edge indexes during query
statement compilation. You can use Cypher statements to query and modify data
in GES, and obtain the result.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1477
Huawei Cloud Stack
Solution Description 15 EI Services
Deployment Mode
GES can be deployed in ECS+OBS or ECS+MRS mode.
● ECS+OBS
● ECS+MRS (MRS version: 3.3.0-LTS)
NOTE
● You can select either of the two deployment modes. If you have enabled the OBS,
choose the ECS+OBS mode.
● For details about the two deployment modes and their differences, see "Getting
Started" > "Deployment Modes" in Graph Engine Service 2.3.14 User Guide (for
Huawei Cloud Stack 8.3.0).
● HDFS of the intelligent Q&A depends on the ECS+MRS mode (MRS 3.3.0-LTS).
Other functions are the same in the two deployment modes.
Function Restrictions
Creating graphs √ √
Deleting graphs √ √
Resizing graphs √ √
Expanding graphs √ √
Querying graphs √ √
Accessing graphs √ √
Importing data √ √
Creating metadata √ ×
Viewing metadata √ ×
Copying metadata √ ×
Editing metadata √ ×
Deleting metadata √ ×
Clearing data √ √
Backing up graphs √ √
Restoring graphs √ √
from backups
Deleting backups √ √
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1478
Huawei Cloud Stack
Solution Description 15 EI Services
Viewing backups √ √
Starting graphs √ √
Stopping graphs √ √
Restarting graphs √ √
Upgrading graphs √ √
Exporting graphs √ √
Binding EIPs √ √
Unbinding EIPs √ √
Viewing results in √ √
the task center
Full-text indexes × √
KBQA × √
Browser Versions
You are advised to use the following browsers:
● Google Chrome: 109, 108, or 107
● Microsoft Edge: 99.0.1150.39 or later
GES Permissions
By default, new IAM users do not have permissions assigned. You need to add the
users to one or more groups, and attach permissions policies or roles to these
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1479
Huawei Cloud Stack
Solution Description 15 EI Services
groups. The users then inherit permissions from the groups to which they are
added. After authorization, the users can perform specified operations on GES
based on the permissions.
GES is a project-level service deployed and accessed in specific physical regions. To
assign GES permissions to a user group, specify the scope as region-specific
projects and select projects for the permissions to take effect. If All projects is
selected, the permissions will take effect for the user group in all region-specific
projects. When accessing GES, the users need to switch to a region where they
have been authorized to use GES.
● Type: There are roles and policies.
– Roles: A type of coarse-grained authorization mechanism that defines
permissions related to user responsibilities. This mechanism provides only
a limited number of service-level roles for authorization. When using
roles to grant permissions, you need to also assign other dependent roles
for permissions to take effect. However, roles are not an ideal choice for
fine-grained authorization and secure access control.
– Policies: A type of fine-grained authorization mechanism that defines
permissions required to perform operations on specific cloud resources
under certain conditions. This mechanism allows for more flexible policy-
based authorization, meeting requirements for secure access control. For
example, you can grant GES users only the permissions for managing a
certain type of cloud servers. For the API actions supported by GES, see .
● Dependencies: Cloud services interact with each other. Therefore, if a GES
policy depends on the policies of other services, the permissions of GES take
effect only after the dependent policies are granted to users. For details, see
Table 15-60 and Table 15-61.
NOTE
Because of the cache, it takes about 13 minutes for an OBS role to take effect after being
granted to users and user groups. After a policy is granted, it takes about 5 minutes to take
effect.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1480
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1481
Huawei Cloud Stack
Solution Description 15 EI Services
Policy Description
Name
GES Use permissions for GES. Users granted these permissions can
Developm perform any operations on GES except for graph creation and
ent deletion.
NOTE
● To interact with OBS, such as creating a graph and importing data, the
users must have the OBS permissions. For details, see Table 15-64.
Creating graphs √ × × ×
Deleting graphs √ × × ×
Querying graphs √ √ √ √
Accessing graphs √ √ √ ×
Importing data √ √ × ×
Creating metadata √ √ × ×
Viewing metadata √ √ √ √
Copying metadata √ √ × ×
Editing metadata √ √ × ×
Deleting metadata √ √ × ×
Clearing data √ √ × ×
Backing up graphs √ √ × ×
Loading backups √ √ × ×
Deleting backups √ √ × ×
Viewing backups √ √ √ √
Starting graphs √ √ × ×
Stopping graphs √ √ × ×
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1482
Huawei Cloud Stack
Solution Description 15 EI Services
Upgrading graphs √ √ × ×
Resizing graphs √ √ × ×
Exporting graphs √ √ × ×
Querying the √ √ √ -
graph list
Incrementally √ √ x graphName
importing data
to graphs
Upgrading √ √ x graphName
graphs
Viewing the √ √ √ -
backup list of a
graph
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1483
Huawei Cloud Stack
Solution Description 15 EI Services
Querying the √ √ √ -
metadata list
Querying √ √ √ metadataNa
metadata me
Verifying √ √ x -
metadata
Deleting √ √ x metadataNa
metadata me
Querying task √ √ √ -
status
Querying the √ √ √ -
task list
VPC
GES uses Virtual Private Cloud (VPC) to provide clusters with network topologies
to isolate clusters and control access.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1484
Huawei Cloud Stack
Solution Description 15 EI Services
OBS
GES stores graph data on Object Storage Service (OBS), satisfying the
requirements for secure, reliable, and cost-effective storage.
● When creating a graph, obtain the vertex and edge data sets from OBS
buckets. In addition, you can use OBS buckets to store logs.
● When incrementally importing data to a graph on the Graph Management
page, obtain the data from OBS buckets. You can also export graph data to
OBS buckets.
● On the page for creating metadata files, select an OBS bucket as the data
storage path.
● You can import the metadata from a local path or an OBS bucket.
15.5.8 Billing
Billing Items
In GES, you pay for the graph size (edges), data storage space, and public network
traffic you use.
Graph size (edges) ● You pay for the graph size (edges) you choose.
● For edge billing, the per-per-use (hourly) and
prepaid instance (monthly/yearly) billing modes are
available.
Data storage space GES data is uploaded or exported from Object Storage
Service (OBS), so the storage billing is based on the
OBS prices.
Billing Modes
● Pay per use (hourly)
In this billing mode, you can enable or disable GES as you like. You are billed
by the use duration on an hourly basis. It is applicable to customers who need
to perform preliminary operation tests and Proofs-of-Concept verifications,
and short-term users.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1485
Huawei Cloud Stack
Solution Description 15 EI Services
Architecture
Figure 15-196 shows the TICS architecture.
● League management
Cloud tenants are invited as data providers to dynamically build trusted
computing leagues and data use can be strictly monitored and controlled
within leagues.
● Converged data analytics
TICS supports converged analysis such as SQL Join of multi-party data for
data consumers by connecting major data storage systems of multiple data
participants. With security technical support, sensitive data statistics of each
party can be collected on TICS aggregated compute nodes.
● Compute node
Data participants use the data source compute node to register data source
with independence and controllability, set privacy policies (sensitive,
insensitive, and anonymization), and publish the metadata. In addition,
reliable full-lifecycle monitoring and O&M management are guaranteed for
data source compute nodes.
● Trustworthy federated learning
TICS interconnects with mainstream deep learning frameworks to implement
horizontal and vertical federated training. With cryptography protocols (such
as oblivious transfer and differential privacy), multi-party sample alignment
and training model protection are supported.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1486
Huawei Cloud Stack
Solution Description 15 EI Services
Federated Supported
SQL analytics
Horizontal Supported
federated
learning
Vertical Supported
federated
learning
15.6.2 Advantages
Multi-Domain Collaborative Planning
● TICS allows you to establish mutual trust leagues among multiple participants
who are distributed and lack trust boundaries.
● TICS supports cross-organization and cross-industry converged data analytics
and multi-party federated learning modeling.
High Flexibility
● TICS supports joint analytics of data from many sources, such as MRS, DLI,
RDS, and Oracle.
● TICS supports multiple deep learning frameworks (such as TICS and
TensorFlow) for federated computing.
● TICS separates control flows and data flows and uses directed acyclic graph
(DAG) to implement automatic orchestration and converged computing of
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1487
Huawei Cloud Stack
Solution Description 15 EI Services
data flows from multiple participants. Users do not need to care about
computing task splitting and combination.
15.6.3 Functions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1488
Huawei Cloud Stack
Solution Description 15 EI Services
Federated prediction jobs use multi-party data and models to implement joint
prediction without sacrificing user data security.
TICS Nodes
Parties use the data source compute node to register data source with
independence and controllability, set privacy policies (including anonymization
and encryption), and publish the metadata. In addition, reliable full-lifecycle
monitoring and O&M management are guaranteed for data source compute
nodes.
Container-based Deployment
TICS allows you to deploy containerized data source compute nodes and
dynamically add aggregated compute nodes. You can deploy nodes on the cloud
or at edge nodes.
Highlights
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1489
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1490
Huawei Cloud Stack
Solution Description 15 EI Services
Highlights
15.6.5 Concepts
League
The organizer creates leagues, binds them with different data protection policies,
and invites data providers to join different leagues for limited data sharing and
application, improving data mining efficiency.
A league is also the carrier of federated computing. You need to create leagues for
managing league members and cooperation data, and view TICS computing
environment. To perform a federated computing task, you need to specify a
league.
Aggregator
An aggregator aggregates multi-party data calculation results.
Party
After joining a league, a party can use the data in the league or publish their own
data to the league for restricted use by other league members.
Invitation
Parties need to accept the invitation sent by the league organizer to join in the
league as a formal partner.
Compute Node
Compute nodes are deployed on the data participant side and connect TICS to the
data of a party to ensure that data can be used with limited permissions assigned
by the party.
A compute node is the minimum unit for managing data. When deploying a
compute node, you need to specify the league configurations. You can configure
connectors, register datasets, execute tasks, and view task execution logs on
compute nodes.
Connector
A connector is a built-in object template of a TICS node used for connecting to a
specific data source. Currently, TICS can connect to MRS Hive, MySQL, RDS,
GaussDB(DWS), and Oracle. New connectors can be added to TICS as well.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1491
Huawei Cloud Stack
Solution Description 15 EI Services
Dataset
Datasets are the party metadata information obtained and configured by compute
nodes, and the attached privacy policies.
Field Classification
Dataset fields are classified based on their service type in federated analytics to
specify the field usage and application scenario, avoiding improper application.
ID
An ID is a field used to identify an entity, such as ID card number, employee ID
and company code.
Sensitive Data
Data that involves privacy, such as salary, tax payment, electricity consumption,
and transaction volume.
Insensitive Data
Data that does not involve privacy, such as the city and company type.
Desensitization
The sensitive part of the raw data is hidden using related algorithms.
Job
A job is a data analytics and learning task created by users.
Job Instance
Each time a job is executed, a job instance record is generated. You can view the
running records of all instances of a job.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1492
Huawei Cloud Stack
Solution Description 15 EI Services
Data Storage
Workload of the CCE or IEF container to which the compute node belongs. You
can set Storage to OBS or SFS during the compute node deployment. If Storage
is set to OBS, the OBS path is mapped to the local path in the service container. If
Storage is set to SFS, the local path of the computer where the compute node is
located is mapped to the local path in the service container.
Server Path
External path of the attached container, which is used for data interaction
between the service container and external systems. TICS can read files such as
datasets in the work directory. The results and log files generated by service
running jobs are also exported to the work directory for you to view and obtain.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1493
Huawei Cloud Stack
Solution Description 15 EI Services
"Statement": [
{
"Action": [
"tics:*:*"
],
"Effect": "Allow"
},
{
"Action": [
"cce:cluster:list",
"cce:node:list",
"ecs:cloudServers:list",
"mrs:cluster:list",
"modelarts:trainJob:create",
"modelarts:trainJobVersion:list"
],
"Effect": "Allow"
}
]
}
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1494
Huawei Cloud Stack
Solution Description 15 EI Services
Browser Restrictions
The following table lists the recommended browser for logging in to TICS.
15.7 AI Cortex
15.7.1 CityCore
Advantages
● All-domain sensing and perception: Helps city managers sense and discover
what's going on in their city in real time based on multi-channel, multimodal
data
● Unified knowledge management and application: Aggregates and centrally
manages city data assets, and accelerates knowledge sharing and reuse
between different government agencies.
● Improved government service efficiency: Automates core government service
processes, such as review and approval and government hotline.
● Centralized deployment and continuous operations: Provide a unified platform
where smart city capabilities and applications can be developed, optimized,
and reused continuously.
15.7.1.2 Functions
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1495
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1496
Huawei Cloud Stack
Solution Description 15 EI Services
● Camera requirements
Item Requirement
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1497
Huawei Cloud Stack
Solution Description 15 EI Services
Item Requirement
Camera ● The detection area does not have objects (such as trees)
installation that block the sight of the camera.
location ● The location must meet the installation requirements
(for example, poles and walls are available for camera
installation).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1498
Huawei Cloud Stack
Solution Description 15 EI Services
● Each layer of an image uploaded through the client cannot exceed 10 GB.
● If you use the SWR console to upload images, a maximum of 10 files can be
uploaded at a time. The size of a single file (including the decompressed files)
cannot exceed 2 GB.
● The container engine version must be 1.11.2 or later.
15.7.2 GeoGenius
Features
GeoGenius provides the following extraordinary features:
1. Unified management and correlation analysis of remote sensing images from
multiple satellites
GeoGenius uses a unified spatial-temporal framework and asset catalog that
enable automatic extraction, conversion, cleansing, and organization of the
metadata of heterogeneous remote sensing images. In addition, GeoGenius
builds unified spatiotemporal indexes for images from different satellites and
sensors to enable correlation query and analysis of the images.
2. Efficient, dynamic rendering of and online access to images
GeoGenius uses Cloud Optimized GeoTIFF (COG) to enable the ImageTunnel
service for accessing image data. This service provides online dynamic image
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1499
Huawei Cloud Stack
Solution Description 15 EI Services
rendering that complies with the OGC Web Map Tile Service (WMTS)
standard and does not require image slicing or publishing. It supports
grayscale and RGB rendering, custom rendering styles, and automatic color
adjustment, facilitating online image comparison and analysis.
3. Easy-to-use workflow orchestration for remote sensing applications
GeoGenius uses the container technology to integrate various types of remote
sensing applications and accelerate batch processing. As a developer, you can
package your remote sensing image analytics application into a container
image and upload the image to GeoGenius, then you will get an application
analytics tool. GeoGenius provides a workflow editor, using which you can
build serial or parallel running logic for remote sensing data jobs through
simple drag-and-drop operations, and define the workflows for remote
sensing data analysis and AI training with zero coding. What's more,
GeoGenius provides standard YAML syntax for workflow orchestration and
allows you to dynamically define analytical workflows.
4. Out-of-the-box remote sensing AI service
GeoGenius pre-integrates high-precision remote sensing AI models from
ecosystem partners. These models are universal and reliable enough to be
used directly in fields such as smart city and natural resources management.
15.7.2.2 Advantages
● Automated, efficient data production
GeoGenius provides an automated remote sensing image production pipeline
powered by cloud-based storage and compute capacities and automated
parallel scheduling. This is a perfect solution to the challenges faced by
conventional remote sensing data systems: large data volumes, low data
processing efficiency, and insufficient computing power.
● Intelligent data management and immediate data availability
Images are released and become available immediately once they are loaded
into the system. Storage space is saved because there are no fragmented files.
The data can be read quickly, while keeping all the longitude and latitude
information. Services like online computing, visualization, and AI inference by
area of interest (AOI) are supported.
● Adaptive, intelligent computing and elastic scheduling
A heterogeneous resource pool consisting of servers powered by Huawei's in-
house developed Kunpeng and Ascend processors provides high-performance,
multi-architecture computing power needed for remote sensing data
processing, access, online computation, model training, and inference.
Adaptive, elastic scheduling ensures that jobs are allocated to the right type
of compute resources. Highly elastic, readily available cloud resources allow
remote sensing application systems to be rolled out quickly and economically.
● Solution available as a service, easy sharing
Industry-tailored algorithms developed by GeoGenius can be quickly deployed
and released as application services that can be easily shared among users,
accelerating innovation across different sectors.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1500
Huawei Cloud Stack
Solution Description 15 EI Services
Environmental monitoring
GeoGenius can analyze remote sensing images to continuously monitor land use
and land cover changes, regional ecological system quality, compliance with
ecological "red lines", urban environment, environmental risks, global climate
change, environmental impact of human activities, and natural resource
development.
Weather forecast
Remote sensing sensors mounted on meteorological satellites measure
meteorological elements such as atmospheric temperature, humidity, wind, and
cloud. Based on such data, accurate forecasts can be made about the
meteorological conditions of the atmosphere, the land, and oceans. This
application covers weather and climate monitoring, air monitoring, and disaster
warning.
Marine conservation
Remote sensing technologies can be used to quantitatively and economically
measure and monitor sea water quality over large areas and long periods of time.
They can also be used to predict the trends of ocean pollution.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1501
Huawei Cloud Stack
Solution Description 15 EI Services
● You are advised to use the following browsers to access the 3D modeling
service console:
– Google Chrome: latest version (recommended)
– Microsoft Edge: latest version
Table 15-71 Constraints for remote sensing and interpretation algorithm services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1502
Huawei Cloud Stack
Solution Description 15 EI Services
2) Resolution: 2 m.
2) Resolution: 0.5 m.
2) Resolution: 0.5 m.
15.7.2.5 Concepts
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1503
Huawei Cloud Stack
Solution Description 15 EI Services
● COG is a GeoTIFF image that can be accessed more easily in the cloud
environment. It stores the original pixels of an image and also organizes them
in a certain way.
● The COG slices an image file and enables clients to read the parts of the file
they need through protocols such as S3 and HTTP without copying the whole
file. This improves the efficiency for accessing large image files and reduces
redundant data storage.
● COG files can be used as common GeoTIFF files, which you can open and
browse using ArcGIS.
Spatial-Temporal Data
Spatial-temporal data are high-dimensional data with complex structure, multiple
nested layers, and both spatial and temporal attributes. The most common type of
spatial-temporal data that GeoGenius processes is remote sensing image data,
which contains the geographical location, shooting time, sensor, and other
metadata of an image. Generally, the geographical location is represented by a
rectangle of the area covered by the remote sensing image data.
Spatial-Temporal Dataset
A spatial-temporal dataset is a collection of spatial-temporal data. GeoGenius
uses datasets to manage remote sensing images of different types and from
different sensors. It also creates a spatial-temporal index for each dataset so that
spatial-temporal data can be quickly retrieved. In addition, you can create a
parallel processing subtask for the spatial-temporal data of each dataset based on
the concurrency policy of a parallel computing workflow. For example, you can
create thumbnails in batches for the data of a dataset.
Image
An image is a template in a standard format for packaging containerized
applications. For example, a container image may contain a Ubuntu OS with user-
desired applications and dependency files. Remote sensing AI models and analytics
tools must be packaged into images so that they can be integrated into
GeoGenius.
Tool
A tool is an encapsulation of an image with a predefined task name, category tag,
default command, execution parameters, and computing resources required by the
image. A tool is a basic unit of a workflow on GeoGenius. For example, an AI-
powered interpretation algorithm for remote sensing, orthographic correction of
images, image fusion, and image mosaicing can all be encapsulated into an
independent tool on GeoGenius.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1504
Huawei Cloud Stack
Solution Description 15 EI Services
Workflow
A workflow consists of one or more tools that are executed in sequence to achieve
a specific purpose together. You define the sequence between these different tools
by specifying their input-output relationships. On GeoGenius, you can create
workflows to perform specific tasks, such as image preprocessing, image AI model
training, and image fusion. You can also dynamically upgrade your services by
upgrading specific tools in workflows.
Stage
A stage defines the context of a tool in a workflow, including the method of
obtaining the parameters for the tool. A workflow may contain one or more
stages.
Job
A job is a workflow in running state. When you input parameters for a workflow, a
job is created. On GeoGenius, you can monitor the job status, progress, logs, and
results.
Artifact
An artifact is the result generated by a job. The platform supports the visualization
of several types of artifacts, including documents, tables, images, VR models, and
3D models. If your job's result is beyond the preceding types, it is not displayed,
but you can download and use it. If you want to view the result on the job details
page, you can specify an artifact type for the output parameter when creating a
workflow.
Resource Quota
The resource quota specifies the amount of resources you can use, such as CPUs,
memory, and GPUs.
Tool Publishing
With the administrator permissions, you can publish your tools to make them
available to all other users.
Workflow Publishing
With the administrator permissions, you can publish your workflows to make
them available to all other users.
Storage Path
A storage path is where files are stored. GeoGenius supports a wide range of
storage types, and their storage paths vary. For example, the storage path of
Object Storage Service (OBS) is obs://bucket/xx, and that of network file
protocols is prefixed with a slash (/).
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1505
Huawei Cloud Stack
Solution Description 15 EI Services
Mount Path
All the job stages on GeoGenius run based on container instances. When a
container instance is started, GeoGenius automatically mounts your storage path
to the container instance as a local file path. Then all programs in the container
instance can access the data in your storage path through the mounted local file
path.
15.7.3 AIVS
15.7.3.2 Scenarios
Smart City
AIVS is an integrated management platform with a flat network architecture that
enables the ingestion of a vast number of video streams from cities. In doing so, it
effectively breaks down organizational, regional, and network barriers. AI is used
to extract and analyze the structured pedestrian and vehicle information in video
streams, improving city governance.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1506
Huawei Cloud Stack
Solution Description 15 EI Services
Sharp Eyes
The project integrates the video data of different protocols to create better and
safer societies.
Smart Campus
By leveraging cloud, AI, and 5G, security protection is becoming more convenient
and intelligent.
15.7.3.3 Constraints
Organization 200
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1507
Huawei Cloud Stack
Solution Description 15 EI Services
Camera installation ● The detection area must not have objects (such as
location trees) blocking the camera's line of sight.
● The location must meet the installation
requirements (for example, poles and walls are
available for camera installation).
ModelArts
ModelArts is a one-stop AI development and management platform that provides
leading algorithm technologies. AIVS relies on ModelArts for algorithm
management and deployment.
15.8 AI Kits
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1508
Huawei Cloud Stack
Solution Description 15 EI Services
AI Kits optimizes and integrates ICT technologies and converged data to enable
collaboration and agile innovation of services such as speech interaction,
certificate recognition, and TFDS, and to build a digital foundation. AI Kits
supports quick development and flexible deployment of services, and agile
innovation of services in a wide range of industries. It also supports collaborative
optimization through ubiquitous links, streamlining the physical and digital
worlds.
Optical Character Recognition (OCR) detects and extracts text from images and
converts the recognition results into an editable JSON format.
15.8.2.1 SIS
Real-Time ASR
Real-Time ASR allows you to obtain real-time speech recognition results by
accessing and invoking the API. Currently, Real-Time ASR supports Mandarin
Chinese.
● Text Timestamps
Generates specific timestamps for the audio conversion result, so that you can
quickly find the spot in the original audio clip to confirm the text and adopt if
needed.
● Intelligent Text Segmentation
By extracting semantic features of the context and combining voice features,
intelligently segments sentences and adds punctuation marks to improve the
readability of the output text.
● Hybrid Recognition
Supports recognition of English letters/words and digits included in Chinese
sentences.
● Instant Result Output
Continuously recognizes voice streams, outputs results in real time, and
automatically corrects the content based on the context language model.
● Automatic VAD
Performs voice activity detection (VAD) on the input voice streams to improve
recognition efficiency and accuracy.
Highlights
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1509
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1510
Huawei Cloud Stack
Solution Description 15 EI Services
● Customizable Models
Increases accuracy by using speech recognition models designed for the
specific requirements of the vertical industry you operate in for other specific
scenarios.
TTS
TTS provides customizable playback. You can adjust the pitch, speed, or volume as
needed.
Highlights
● Multiple Timbres
TTSC provides customizable playback (male, female, child's voices for you to
select). You can adjust the speed or volume as needed.
● Smooth and Natural
The speech converted from text is natural, clear, and lifelike, meeting
requirements of various application scenarios.
Speaker recognition
Identify speakers by their unique voice characteristics from the voiceprint library.
Speech Analysis
Convert continuous audio streams into text in real time. It is applicable to
scenarios such as live subtitling, conference recording, and instant text generation.
15.8.2.2 OCR
Function Description
● General Table OCR
Automatically detects and extracts text and their row and column locations
from images of tables in various formats, as well as the text areas outside
tables. It is used to store information on documents and reports as structured
data.
● General Text OCR
Automatically detects and extracts text and their locations from images and
converts them into structured data.
● Handwritten Text OCR
Automatically detects and extracts handwritten text from document images
and converts the text into structured data.
● Web Image OCR
Automatically detects and extracts all text, their locations, and contact
information (if any) from web images for data mining and post-processing.
● Auto Classification OCR
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1511
Huawei Cloud Stack
Solution Description 15 EI Services
Automatically detects and extracts text and their position coordinates from
ticket images, converts them into structured data, and returns the categories
of the images.
Application Scenarios
● Electronic documentation archive
Automatically detects and extracts text, signatures, and seals from document
images and converts them into structured data for faster review.
● Express waybill filling
Automatically detects and extracts contact information from images and fills
in express waybills, eliminating the need for manual input.
● Contract entry and review
Automatically detects and extracts text, signatures, and seals from contract
images and converts them into structured data for faster review.
Function Description
Automatically detects and extracts text from multiple cards and receipts in an
image, returns the categories of the cards and receipts, and converts the text into
structured data.
Application Scenarios
Auto Classification OCR is applicable to multiple scenarios such as identity
authentication and financial reimbursement. It is easy to use and effectively
improves data entry efficiency.
Scenario 1: Recognition of cards and receipts
Scenario 2: Recognition of receipts of the same type
Scenario 3: Recognition of different types of receipts
Category
● Cards
Currently, the following card types are supported: ID card (including the front
side and the back side), driving license (including the primary and secondary
pages), vehicle license (including the primary and secondary pages), passport,
bank card, and transportation license.
● Receipts
Currently, the following receipt types are supported: value-added tax (VAT)
invoice (including special invoice, general invoice, and electronic invoice),
unified invoice for motor vehicle sales, taxi invoice, train invoice, quota
invoice, vehicle toll invoice, and flight itinerary invoice.
Advantages
● Simplified calling
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1512
Huawei Cloud Stack
Solution Description 15 EI Services
One API can be directly called to recognize various cards, certificates, and
tickets. The image type does not need to be determined during calling, and
there is no need to call different APIs for each type of data, which simplifies
integration and use.
● Easier management
Use invoice reimbursement as an example. It is difficult to estimate the
quantity of each type of invoices separately, but it is easier to predict the total
quantity of invoices based on historical statistics.
Function Description
● ID Card OCR
Automatically detects and extracts all information from images of both sides
of ID cards, including the ID number, name, and address, even under complex
conditions such as dark light, tilt, overexposure, and shadow.
● Driving License OCR
Automatically detects and extracts all information from images of the primary
and secondary pages of driving licenses, including the name, gender, issue
date, driving class, validity period, and file number, even under complex
conditions such as dark light, tilt, overexposure, anti-counterfeit watermark
interference, and shadow, and converts the information into structured data.
● Vehicle License OCR
Automatically detects and extracts all information from vehicle license
images, including the plate number, vehicle type, owner, usage nature, model,
VIN, engine number, registration date, file number, approved passenger
capacity, gross mass, unladen mass, approved load, overall dimension, traction
mass, comments, inspection record, and barcode, even under complex
conditions such as dark light, tilt, overexposure, anti-counterfeit mark
interference, and shadow, and converts the information into structured data.
● Passport OCR
Automatically detects and extracts all information from images of Chinese
passports and six to seven key fields from images of passports issued by other
countries based on the machine-readable code, including the name, gender,
date of birth, passport number, country code, and date of expiry, even under
complex conditions such as dark light, tilt, overexposure, and shadow.
● Business License OCR
Automatically detects and extracts text from business license images,
including the company name, registration number, legal representative,
address, registered capital, business term, and business scope, even under
complex conditions such as dark light, tilt, and watermark interference.
● Bank Card OCR
Automatically detects and extracts text from bank card images, including the
card type (debit or credit), card number, validity period, card issuer, and card
holder's name (only on credit cards).
● Transportation License OCR
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1513
Huawei Cloud Stack
Solution Description 15 EI Services
Automatically detects and extracts all information from images of the first
pages of road transportation licenses, including the owner's name, license
number, license plate number, and vehicle type.
● Plate Number OCR
Automatically detects and extracts text from license plate images.
● Business Card OCR
Automatically detects and extracts information from business card images,
including the name, position and title, company, department, contact
information, address, email address, fax, postal code, and company website,
and converts the information into structured data.
● VIN OCR
Automatically detects and extracts vehicle identification numbers (VINs) from
images.
Application Scenarios
● Authentication
Verifies that the user is the certificate holder.
● Certificate information entry
Automatically detects and extracts key information from certificate images,
eliminating the need for manual entry.
● Identity verification
Verifies that the user is the certificate holder.
Function Description
● VAT Invoice OCR
Automatically detects and extracts text from value-added tax (VAT) invoice
images using technologies such as image preprocessing, table extraction, text
extraction, text recognition, and structured information output, significantly
reducing manual entry costs.
● Motor Vehicle Sales Invoice OCR
Automatically detects and extracts text from motor vehicle sales invoice
images and converts the text into structured data, which significantly reduces
manual entry costs.
● Flight Itinerary OCR
Automatically detects and extracts all information from flight itinerary
images, including the passenger name, ID number, order number, and ticket
price.
● Quota Invoice OCR
Automatically detects and extracts all information from quota invoice images,
including the invoice number, invoice code, place of issue, and amount.
● Train Ticket OCR
Automatically detects and extracts all information from train ticket images,
including the ticket number, ticket gate, and train number.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1514
Huawei Cloud Stack
Solution Description 15 EI Services
Application Scenarios
● Expense reviews
Automatically detects and extracts key information from VAT invoice images
for faster reimbursement.
● Commercial loans
Automatically detects and extracts key information from images of motor
vehicle sales invoices and contracts, accelerating vehicle loan handling.
● Medical insurance reimbursement
Automatically detects and extracts key fields from medical invoice images,
including the medicine details, age, and gender, converts the information into
structured data, enter the data into business systems, and works with ID Card
OCR and Bank Card OCR to complete reimbursement.
15.8.2.3 TFDS
Trouble of moving freight car detection system
The TFDS intelligent recognition algorithm model is established to automatically
identify and predict freight car faults, assisting manual review and confirmation of
results.
● Identification rate of class-A faults (faults that endanger driving safety): >
99.99%
● Identification rate of class-B faults (faults that affect driving safety): > 95%
● Identification rate of class-C faults (faults that do not directly affect driving
safety): > 90%
● No-fault image filtering rate: > 95%
● Average number of faulty components falsely reported by vehicles: < = 4
● Vehicle applicability rate: > 95%
● The automatic identification time of a single train (50 cars): < = 10 minutes
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1515
Huawei Cloud Stack
Solution Description 15 EI Services
OCR
● Certificate identification
Companies may receive a large number of electronic materials, especially
image electronic materials. AI-related algorithms can be used to
automatically perform compliance review and intelligent classification on
these image electronic materials, and verify the accuracy of the materials
submitted by affair applicants. By reviewing the compliance of the materials,
companies can realize intelligent management of the whole process of affair
handling, conveniently query, collect, classify, and review the data of all links,
and improve the affair handling efficiency.
● Identification of multiple tickets/cards in one image
Processes tickets and certificates of the same type in batches, combines
tickets and certificates of different types, and splits and recognizes invoices
and cards of multiple types. Greatly improve user experience and the
processing efficiency of customer data.
● Invoice reimbursement and verification
Automatically recognizes and inputs employees' invoices, saving labor costs
and improving efficiency.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1516
Huawei Cloud Stack
Solution Description 15 EI Services
TFDS
Trouble of moving freight car detection system
Uses advanced AI processing technology to analyze real-time images collected by
TFDS and automatically identify faults, making identification more efficient and
accurate.
Cloud Eye
Cloud Eye monitors metrics of AI Kits, as shown in Table 15-74. You can view AI
Kits usage by metric. For more information about Cloud Eye, see Cloud Eye User
Guide.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1517
Huawei Cloud Stack
Solution Description 15 EI Services
NOTE
Each sub-service has the preceding metrics (Successfully Calls and Failed calls).
OBS
OBS is a stable, secure, efficient, and easy-to-use cloud storage service. AI Kits
APIs involve user data processing. You can use OBS to improve processing
efficiency by batch processing data on the cloud.
AI Kits can be temporarily authenticated or anonymously and publicly authorized
to obtain data from Object Storage Service (OBS) for processing.
15.8.5 Constraints
SIS
● Real-Time ASR
– The audio sampling rate is 8 kHz or 16 kHz, and the audio bit depth is 8-
bit or 16-bit.
– Mandarin Chinese is supported.
● Audio File Transcription
– The following formats are supported: pcm16k16bit, pcm8k16bit,
ulaw16k8bit, ulaw8k8bit, alaw16k8bit, alaw8k8bit, vox8k4bit, WAV
(supporting the pcm/ulaw/alaw/adpcm coding format), MP3, M4A, ogg-
speex, ogg-opus, and AMR.
– The audio file duration cannot exceed 5 hours and the size cannot exceed
300 MB. The recognition task takes a maximum of 6 hours, and the
recognition result will be retained for 72 hours (counting started when
the result is generated).
● Text to Speech
– Only Chinese is supported. The text to be converted can contain a
maximum of 500 Chinese characters.
– The supported synthesis sampling rates are 8 kHz and 16 kHz.
OCR
● General Table OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– The area to be recognized must occupy more than 80% of the image.
When scanning a table, ensure that the entire table and its surrounding
area are included in the image.
– An image can be rotated to any angle.
– Text in images with complex backgrounds (such as outdoor scenery or
anti-counterfeit watermarks) or distorted table lines cannot be
recognized.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1518
Huawei Cloud Stack
Solution Description 15 EI Services
– English and Chinese are supported but support for traditional Chinese
characters is limited.
● General Text OCR
– Only images in PNG, JPG, JPEG, BMP, GIF, TIFF, WebP, PCX, ICO, or PSD
format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– The area to be recognized must occupy more than 80% of the image.
When scanning a table, ensure that all text and its surrounding area are
included in the image.
– An image can be rotated to any angle.
– Text in images with complex backgrounds (such as outdoor scenery or
anti-counterfeit watermarks) or distorted text cannot be recognized.
● Web Image OCR
– English and Chinese are supported but support for traditional Chinese
characters is limited.
– Only images in JPG, JPEG, PNG, BMP, TIFF, TGA, WEBP, ICO, PCX, or GIF
format can be recognized.
– Common image types are supported, such as mobile phone or desktop
screenshots, e-commerce product images, and advertisement design
drawings.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– The characters to be recognized must occupy more than 60% of the
image.
– The web image to be recognized can be rotated to any angle (direction
detection must be enabled).
● Transportation License OCR
– Only the transportation licenses issued by the Chinese mainland can be
recognized.
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 4,096 pixels.
– A transportation license can be rotated to any angle.
– Illuminated or dark images, or images with anti-counterfeit watermarks
can be recognized, but the accuracy may be compromised.
● Auto Classification OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,000 pixels.
– A ticket can be rotated to any angle.
● Handwritten Text OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– The area to be recognized must occupy more than 80% of the image.
When scanning a table, ensure that all text and its surrounding area are
included in the image.
– The image can be rotated to any angle when direction detection is
enabled.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1519
Huawei Cloud Stack
Solution Description 15 EI Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1520
Huawei Cloud Stack
Solution Description 15 EI Services
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 4,096 pixels.
– The information page of the passport to be recognized must occupy more
than 25% of the image. When scanning a passport, ensure that the entire
page is displayed in the image.
– A passport can be rotated to any angle.
– The passport in the image can be moderately distorted, but the aspect
ratio cannot be distorted by more than 10%.
– Illuminated or dark images can be recognized, but the accuracy may be
compromised.
● Bank Card OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– Only the front side of a bank card can be recognized.
– Only regularly sized bank cards (85.60 × 53.98 mm) can be recognized.
Mini cards or other irregularly sized cards are not supported.
– An image can be rotated to any angle.
● Business License OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– The business license to be recognized must occupy more than 70% of the
image. When scanning a business license, ensure that the entire business
license is displayed in the image.
– A business license can be moderately distorted or rotated to any angle.
– Dark images can be recognized, but the accuracy may be compromised.
● Plate Number OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 4,096 pixels.
– The license plate in the image must be placed with the front facing up
and must be clear and not blocked or tilted.
– Currently, the following license plate types are supported: small vehicle,
small new energy vehicle, large new energy vehicle, embassy vehicle,
consulate vehicles, entry-exit vehicle traveling to or from Hong Kong and
Macao, coach vehicle, and police vehicle. Dual-license plate vehicles are
supported.
● VIN OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 4,096 pixels.
– Illuminated or dark images, or images with anti-counterfeit watermarks
can be recognized, but the accuracy may be compromised.
● Business Card OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1521
Huawei Cloud Stack
Solution Description 15 EI Services
– The business card must occupy more than 60% of the image. When
scanning a business card, ensure that the entire business card content is
included in the image.
– The image can be rotated to any angle when direction detection is
enabled.
– Illuminated or dark images, or images with anti-counterfeit watermarks
can be recognized, but the accuracy may be compromised.
● VAT Invoice OCR
– Only files in JPEG, JPG, PNG, BMP, TIFF, PDF or OFD format can be
recognized. If a PDF file contains multiple pages, only the first page is
identified.
– No side of the image can be smaller than 100 or larger than 8,192 pixels.
– An invoice to be recognized must occupy more than 80% of the image.
– An invoice can be rotated to any angle.
– The image aspect ratio must be consistent with that of the real invoice.
– Only the VAT invoices from China can be recognized.
– Special VAT invoices and plain VAT invoices (including electronic invoices)
can be recognized. Volume invoices and toll invoices are included.
● Motor Vehicle Sales Invoice OCR
– Only images in PNG, JPG, JPEG, BMP, TIFF, or PDF format can be
recognized.
– No side of the image can be smaller than 100 or larger than 8,000 pixels.
– The area to be recognized must occupy more than 80% of the image.
Ensure that the entire invoice and its surrounding area are included in the
image.
– An invoice can be rotated to any angle.
– The invoice in the image can be moderately distorted, but the aspect
ratio cannot be distorted by more than 10%.
● Taxi Invoice OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 4,096 pixels.
– A taxi invoice to be recognized must occupy more than 25% of the
image. When scanning a taxi invoice, ensure that the entire taxi invoice is
displayed in the image.
– The invoice in the image can be moderately distorted, but the aspect
ratio cannot be distorted by more than 10%.
– A taxi invoice can be rotated to any angle.
● Toll Invoice OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 4,096 pixels.
– An invoice to be recognized must occupy more than 25% of the image.
– An invoice can be rotated to any angle.
– Only the China-issued toll invoices can be recognized.
● Flight Itinerary OCR
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1522
Huawei Cloud Stack
Solution Description 15 EI Services
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– A flight itinerary can be rotated to any angle.
– Illuminated or dark images can be recognized, but the accuracy may be
compromised.
● Quota Invoice OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 4,096 pixels.
– An invoice to be recognized must occupy more than 25% of the image.
– An invoice can be rotated to any angle.
– The invoice in the image can be moderately distorted, but the aspect
ratio cannot be distorted by more than 10%.
● Train Ticket OCR
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– A train ticket to be recognized must occupy more than 25% of the image.
– A train ticket can be rotated to any angle.
– The train ticket in the image can be moderately distorted, but the aspect
ratio cannot be distorted by more than 10%.
● Transportation Qualification Certificate
– Only images in PNG, JPG, JPEG, BMP, or TIFF format can be recognized.
– No side of the image can be smaller than 15 or larger than 8,192 pixels.
– The area to be recognized must occupy more than 80% of the image.
When scanning a table, ensure that the entire table and its surrounding
area are included in the image.
– An image can be rotated to any angle.
– Text in images with complex backgrounds (such as outdoor scenery or
anti-counterfeit watermarks) or distorted table lines cannot be
recognized.
TFDS
TFDS image recognition conditions:
Image brightness: 35 < L < 120 (L: weighted average grayscale value of all pixels
of an image, reflecting the overall brightness of the image)
Image contrast: 35 < C < 75 (C: standard deviation of grayscale values of all pixels
of an image, reflecting the brightness change intensity of the image)
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1523
Huawei Cloud Stack
Solution Description 16 Management Services
16 Management Services
Functions
Service Builder provides the following functions:
● Service template management functions described in Table 16-1.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1524
Huawei Cloud Stack
Solution Description 16 Management Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1525
Huawei Cloud Stack
Solution Description 16 Management Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1526
Huawei Cloud Stack
Solution Description 16 Management Services
Constraints
● Currently, Service Builder is used only in the Huawei Cloud Stack scenario.
● Before creating, importing, or modifying a service template, creating,
importing, modifying, assigning a component, or using functions related to
service API providers, ensure that the ServiceCenter advanced-edition license
has been imported and resource pools have been updated. For details about
how to update resource pools, see section "Virtual Resource Pool Monitoring"
> "Components" in ManageOne 8.3.0 O&M Guide.
NOTE
The ServiceCenter advanced edition license has the following two modes:
● Product license: ServiceCenter Advanced Edition License (per CPU)
For more information about license-related operations, see ManageOne 8.3.0
License Guide.
● Cloud service permission mode: Hybrid Cloud CMP Service for HCS M1-Service
Center Advanced-per Suite-Yearly or Hybrid Cloud CMP Service for HCS-Service
Center Advanced-per Suite-Yearly
● In ManageOne 8.0.1 and later versions, the OS::Heat::WaitCondition and
OS::Heat::WaitConditionHandle resources are not supported.
● In ManageOne 8.0.3 and later versions, vAPP is renamed Service Builder.
Service Templates
A service template can be created from existing resource components or a
combination of cloud services, service APIs, resource components, and combined
APIs based on their specific associations. Service templates can be used to manage
life cycles of resources and orchestrate the logics of how resources are requested
and deleted. Services can be quickly created using service templates and then
added to the service catalog or portal. If users request the services from the portal
or service catalog, the orchestrated request logics will be automatically executed
to request instances of the services. If they delete service instances, the
orchestrated deletion logics will be executed.
Components
A component combines service APIs or resources, such as ECSs, networks, and AS
groups, based on a specific relationship. Components can be used to create
templates.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1527
Huawei Cloud Stack
Solution Description 16 Management Services
16.1.3 Benefits
Service Builder can help government and enterprise customers quickly provision
their IT capabilities as services. Service Builder has the following benefits:
● Redefines cloud services as required.
Service Builder redefines the cloud service provisioning process to take your
experience to the next level. It combines cloud services at your fingertips with
your approval processes and standardizes the cloud service request process.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1528
Huawei Cloud Stack
Solution Description 16 Management Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1529
Huawei Cloud Stack
Solution Description 16 Management Services
16.1.5 Architecture
Service Builder matches cloud-native services with government and enterprise IT
requesting processes to standardize the requesting process, and allows for
orchestration across regions, resource pools, and clouds. In addition, it provides the
page design and process orchestration capabilities to orchestrate your legacy IT
capabilities into new cloud services, which boosts IT resource sharing to cultivate a
robust IT service ecosystem. Figure 16-2 shows the overall architecture of Service
Builder.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1530
Huawei Cloud Stack
Solution Description 16 Management Services
Figure 16-3 Relationships between Service Builder and other cloud services
Table 16-6 Relationship between Service Builder and other cloud services
ECS Service Builder uses the ECS service to create ECSs, and
manage and maintain the created ECSs.
BMS Service Builder uses the BMS service to create BMSs, and
manage and maintain the created BMSs.
VPC The VPC service provides subnets and security groups for
Service Builder to create ECSs or BMSs.
EVS Service Builder uses the EVS service to create EVS disks for
ECSs or BMSs, and manage and maintain the created EVS
disks.
IMS Before using Service Builder to create an ECS or a BMS, use the
IMS service to create an image required by the ECS or BMS
first. If scripts in Service Builder need to obtain software from
images and install the software on ECSs or BMSs, software
must be installed in the images.
CCE Service Builder uses the CCE service to create, manage, and
maintain CCE resources such as clusters, node pools,
namespaces, and containers.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1531
Huawei Cloud Stack
Solution Description 16 Management Services
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1532
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
17.1 Workspace
Working Principles
End users can use terminals to log in to the desktops created by administrators on
the console of the cloud platform. Users can also access network applications
stored on enterprise networks through Direct Connect or VPN. Figure 17-1 shows
the working principles of Workspace.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1533
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
17.1.2 Advantages
Workspace supports out-of-the-box desktop provisioning and seamless login from
multiple terminals, providing you with a reliable, secure, flexible, and efficient
office environment.
Smooth Experience
The in-house Huawei Delivery Protocol (HDP) ensures smooth HD transmission,
true-color lossless display, and ultra-low desktop control latency.
Open Ecosystem
Workspace provides open APIs for migrating your office system to the cloud
without developing underlying technologies.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1534
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
17.1.3 Scenarios
Traditional PCs and VDIs are expensive and difficult to deploy and manage.
Workspace does not require initial investment or continuous infrastructure
management. You only need to pay certain fees for a complete set of cloud
desktop computing services, including computing and persistent storage. It also
allows you to provide your users with a secure desktop experience and diverse
access options in a simple and cost-effective manner.
Desktop users are end users. Figure 17-3 shows the operation process.
For Administrators
Administrators can create desktops on the Workspace console. During desktop
creation, administrators can determine whether to connect to the AD domain and
assign desktops to specific users. After a desktop is created, the system
automatically pushes a notification of enabling the desktop to the end user.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1535
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
Desktop
A desktop is a virtual computer system that is installed with desktop agent
software and can interact with desktop management components. Workspace
hosts and manages all desktops in the data center in a unified manner. End users
can log in to desktops using soft clients (SCs), thin clients (TCs), and mobile
terminals to obtain complete PC desktop user experience.
You can create a dedicated desktop for each end user so that each end user can
exclusively use a desktop.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1536
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
User
Users are classified into end users and administrators based on their permissions.
An end user is a user who has the permission for logging in to and using desktops.
An administrator is a tenant, that is, a user who assigns desktops to users. The
administrator has the permissions for creating desktops, deleting desktops, setting
policies, and managing users.
Policy
A policy is a set of security rules configured for desktops, including USB
redirection, file redirection read/write permission, clipboard read/write permission,
watermark, client automatic reconnection interval, and image display. Policies are
used to control data transmission between user terminals and desktops and
peripheral access permission.
Priority
The priority is the basis for Workspace to determine the execution sequence or
weight of desktop policies. The priority is represented by a positive integer. A
smaller value indicates a higher priority.
Software Client
A software client (SC) is a Workspace client installed on a local PC so that users
can access desktops from the PC.
Thin Client
A thin client (TC) is a small-sized commercial PC that is designed based on the PC
industry standard. It uses a professional embedded processor, small local flash
memory, and simplified OS for desktop access. The TC sends the inputs of the
mouse and keyboard to the background server for processing. Then the server
returns the processing result to the monitor connected to the TC for display. The
performance, peripheral interfaces, and operation GUIs of TCs vary depending on
models, meeting requirements for common office work, security-sensitive office
work, and high-performance graphics design.
Mobile Terminal
A mobile terminal is a Workspace client installed on a mobile device so that users
can access the desktop through the mobile device. The mobile device is called a
mobile terminal.
AD Management Server
The Active Directory (AD) management server is the infrastructure component
where the AD service is deployed. It provides a series of directory service functions
that allow users to manage and access network resources in a unified manner.
Workspace can connect to your own AD server to implement authentication and
authorization of Workspace.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1537
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
Region and AZ
A region and availability zone (AZ) identify the location of a data center. You can
create desktops in a specific region or AZ.
Regions are determined based on geographical location and network latency.
Public services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS),
Object Storage Service (OBS), Virtual Private Cloud (VPC), Elastic IP (EIP), and
Image Management Service (IMS), are shared within the same cloud region.
Regions are classified as universal regions and dedicated regions. A universal
region provides universal cloud services for common tenants. A dedicated region
provides only services of the same type or provides services only for specific
tenants.
VDC
A Virtual Data Center (VDC) is the unit used by ManageOne to assigned resources
and is used in multi-level operations scenarios. A VDC matches a department of
an enterprise or subsidiary. A maximum of five levels are supported. For details,
see ManageOne x.x.x Product Documentation.
Resource Space
A resource space is a collection of resources. Resource spaces are isolated from
each other and can be assigned to specific users. For details, see ManageOne
x.x.x Product Documentation.
Multi-factor Authentication
Multi-factor authentication (MFA) provides an additional layer of protection on
top of the username and password. If you enable MFA, users need to enter the
username and password as well as a verification code when logging in to a
desktop.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1538
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
Ubuntu 20.04
Supported SCs
You can log in to a desktop using any of the SCs listed in Table 17-2.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1539
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
Terminal OS Description
● Phytium chip + UOS V20 Users can log in to desktops by installing the
Professional 1031 Workspace client of the corresponding
● Phytium chip + Kylin V10 SP1 version.
2107
● Kirin 990 chip + UOS V20
Professional 1042
● Kirin 990 chip + Kylin V10
SP1 2107
● Zhaoxin chip + UOS V20
Professional 1031
● Zhaoxin chip + Kylin V10 SP1
2107
● Hygon chip + UOS V20
Professional 1031
● Hygon chip + Kylin V10 SP1
2107
● Intel chip + UOS V20
Professional 1031
● Intel chip + Kylin V10 SP1
2107
● Ubuntu 18.04 and 20.04
Supported TCs
Multiple types of Workspace-compatible TCs can be used to log in to desktops. For
example, you can use any of the TCs listed in Table 17-3 to log in to desktops.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1540
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
17.1.7 Constraints
This section describes constraints on using Workspace.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1541
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
Network The selected CIDR block does not conflict with the
POD_Service_OP_SVC CIDR block planned in
Huawei Cloud Stack 8.3.0 LLD Template. Otherwise,
desktops cannot be created.
Desktop Policy ● A desktop policy will take effect upon your next
configuratio login to the desktop.
n ● Unidirectional or bidirectional copy from the
client to the server or from the server to the
client is supported.
– Rich text copy and file copy are supported only
when both the client (TC/SC) and desktop run
Windows. A maximum of 500 files can be
copied at a time.
– If the OS of a client (TC/SC or mobile client) or
desktop is not Windows, only text can be
copied.
● Rendering acceleration only applies to
multimedia video editing.
● The default policy is a preset common policy and
its priority cannot be changed.
● When you create multiple policies, the default
policy has the lowest priority.
● By default, a maximum of 50 policies can be
created in a region.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1542
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
Desktop Resendin You can resend a notification email only when the
managemen ga user is bound to a desktop.
t notificati
on email
Deleting You can delete a user only when the user is not
a user bound to a desktop.
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1543
Huawei Cloud Stack
Solution Description 17 Enterprise Application Service
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1544
Huawei Cloud Stack
Solution Description 18 Glossary
18 Glossary
AC Access Controller
AD Active Directory
AK Access Key ID
AS Auto Scaling
AZ Availability Zone
CE Customer Edge
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1545
Huawei Cloud Stack
Solution Description 18 Glossary
DB Data Base
DC Data Center
DR Disaster Recovery
EIP Elastic IP
FC Fiber Channel
HA High Availability
I/O Input/Output
ID IDentity
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1546
Huawei Cloud Stack
Solution Description 18 Glossary
IP Internet Protocol
IT Information Technology
PC Personal Computer
RC Resource Cluster
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1547
Huawei Cloud Stack
Solution Description 18 Glossary
SG Security Group
UI User Interface
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1548
Huawei Cloud Stack
Solution Description 18 Glossary
VM Virtual Machine
Issue 01 (2023-09-30) Copyright © Huawei Cloud Computing Technologies Co., Ltd. 1549