Вы находитесь на странице: 1из 61

FusionCompute

V100R005C10

Product Description

Issue 01
Date 2015-11-11

HUAWEI TECHNOLOGIES CO., LTD.


Copyright © Huawei Technologies Co., Ltd. 2015. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions

and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.

The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website: http://e.huawei.com

Issue 01 (2015-11-11) Huawei Proprietary and Confidential i


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description About This Document

About This Document

Purpose
This document describes the basic information about the product for users to learn the
FusionCompute.

Intended Audience
This document is intended for:
l Technical support engineers
l Maintenance engineers

Symbol Conventions
The symbols that may be found in this document are defined as follows:

Symbol Description

Indicates an imminently hazardous situation which, if


not avoided, will result in death or serious injury.
DANGER

Indicates a potentially hazardous situation which, if not


avoided, could result in death or serious injury.
WARNING

Indicates a potentially hazardous situation which, if not


avoided, may result in minor or moderate injury.
CAUTION

Indicates a potentially hazardous situation which, if not


avoided, could result in equipment damage, data loss,
NOTICE
performance deterioration, or unanticipated results.
NOTICE is used to address practices not related to
personal injury.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential ii


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description About This Document

Symbol Description

NOTE Calls attention to important information, best practices


and tips.
NOTE is used to address information not related to
personal injury, equipment damage, and environment
deterioration.

GUI Image Conventions


The GUI images that may be found in this document are for reference only. See the product
GUI in practice.

Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.

Issue 01 (2015-11-11)
This is the first official release.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential iii


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description Contents

Contents

About This Document.....................................................................................................................ii


1 Overview......................................................................................................................................... 1
1.1 Product Orientation.........................................................................................................................................................2
1.2 Features...........................................................................................................................................................................4

2 Product Architecture..................................................................................................................... 6
2.1 Software Components.....................................................................................................................................................7
2.2 Interfaces and Protocols..................................................................................................................................................8

3 Deployment Scheme................................................................................................................... 10
3.1 System Requirements................................................................................................................................................... 11
3.2 Software Deployment Scheme..................................................................................................................................... 18

4 Product Functions........................................................................................................................ 21
4.1 Virtual Computing........................................................................................................................................................ 22
4.2 Virtual Network............................................................................................................................................................ 26
4.3 Virtual Storage.............................................................................................................................................................. 27
4.4 Compatibility................................................................................................................................................................ 29
4.5 Availability................................................................................................................................................................... 30
4.6 Security......................................................................................................................................................................... 30

5 System Principle.......................................................................................................................... 32
5.1 Communication Principles........................................................................................................................................... 33
5.2 Time Synchronization Mechanism............................................................................................................................... 38

6 Reliability......................................................................................................................................39
6.1 Software Reliability...................................................................................................................................................... 40
6.2 Architecture Reliability................................................................................................................................................ 42

7 Technical Specifications.............................................................................................................44
A Glossary........................................................................................................................................47
A.1 A-E...............................................................................................................................................................................48
A.2 F-J................................................................................................................................................................................ 49
A.3 K-O.............................................................................................................................................................................. 51
A.4 P-T............................................................................................................................................................................... 52

Issue 01 (2015-11-11) Huawei Proprietary and Confidential iv


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description Contents

A.5 U-Z...............................................................................................................................................................................53

Issue 01 (2015-11-11) Huawei Proprietary and Confidential v


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 1 Overview

1 Overview

About This Chapter

1.1 Product Orientation


1.2 Features

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 1


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 1 Overview

1.1 Product Orientation


The FusionCompute is a cloud operating system (OS). It virtualizes computing, storage, and
network resources, and implements centralized management and scheduling of the virtual
resources through a unified interface.

The FusionCompute provides high system security and reliability and reduces operational
costs. It helps carriers and enterprises build secure, green, and energy-saving data centers.

Figure 1-1 shows the FusionCompute position in the Huawei cloud computing solution.

Figure 1-1 FusionCompute position in the Huawei cloud computing solution

FusionCloud Desktop Solution FusionCube ...

API

FusionSphere
eBackup UltraVR

FusionCompute
Virtual resource scheduling FusionSphere SOI
Availability Security Scalability

Virtual computing Virtual storage Virtual network


FusionManager
FusionStorage Service
Resource management
Distributed snapshot Distributed linked cloning and
service
Security assurance
Distributed thin Service
Distributed RAID provisioning auomation
Compatibility

Hardware infrastructure

Servers Storage Network Security

Cloud equipment room

Cabinet Power Cooling Fire fighting Grounding


supply Cabling Monitoring Decoration

Cloud Facilities
Cloud facilities refer to the auxiliaries and space required by the cloud data center, including
the power supply system, fire-fighting system, wiring system, and cooling system.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 2


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 1 Overview

Huawei has been devoted to continuously enhancing the competitiveness of the data center
based on the concept called SAFE, which focuses on smartness, availability, flexibility, and
efficiency.

FusionSphere
The FusionSphere virtualizes hardware resources using the virtualization software deployed
on physical servers, so that one physical server can be used as multiple virtual servers. The
FusionSphere allocates all current workloads to VMs on some servers, so that new
applications and solutions can be deployed on the servers whose original workloads are
migrated to other VMs.
l Hardware Infrastructure Layer
Hardware infrastructure consists of servers, storage devices, network devices, and
security devices. These resources allow customers to build different scale systems and
expand its capacity based on actual needs and to use applications ranging from entry
level to enterprise level. Various devices provide customers with multiple and flexible
choices.
l FusionManager
The FusionManager monitors and manages hardware and software of cloud computing.
It provides automatic resource provisioning and automatic operation and maintenance
(O&M) for the infrastructure. Additionally, it provides a web user interface (UI) to
administrators to operate and manage the resources in the system.
l FusionStorage
FusionStorage is the distributed storage software that integrates storage and computing
capabilities. It can be deployed on general-purpose x86 servers to consolidate the local
disks on all the servers into a virtual storage resource pool that provides the block
storage function.
l FusionSphere SOI
FusionSphere System Operation Insight (SOI) collects and displays VM performance
indicators in the FusionSphere cloud system, models and analyzes the collected data,
makes predictions on future performance changes based on the collected data, and
provides suggestions on system performance management.
l eBackup
The VM backup scheme uses the Huawei eBackup backup software combined with the
snapshot backup function and the Changed Block Tracking (CBT) backup function of
the FusionCompute to back up VM data.
l UltraVR
UltraVR is a piece of disaster recovery (DR) management software. By using the
asynchronous remote replication feature of the underlying storage system, FusionCloud
UltraVR provides Huawei virtual machines (VMs) data protection and DR of critical
data.

FusionCloud Desktop Solution


FusionCloud Desktop Solution is a virtual desktop application based on Huawei
FusionSphere. With hardware and software deployed on the FusionSphere, end users can use
a thin client (TC) or any other device that is connected to the network to access applications
and their desktops.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 3


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 1 Overview

FusionCube
The FusionCube is an integrated cloud infrastructure platform developed for large- and
medium-sized enterprises to improve core business operating efficiency.

1.2 Features
Unified Virtualization Platform
FusionCompute uses virtualization management software to create high-performance,
operable, and manageable virtual machines (VMs) over computing resources. FusionCompute
provides the following functions:
l Allocates VM resources on demand.
l Supports various operating systems (OSs).
l Isolates VMs to ensure quality of service (QoS).

Support for Various Hardware Platforms


FusionCompute supports various x86 servers and is compatible with various storage devices.

Big Cluster
A cluster supports up to 128 hosts and 3000 VMs.

Automatic Resource Scheduling


FusionCompute allows users to define service-level agreement (SLA) policies, fault reporting
criteria, and fault rectification policies.
l FusionCompute implements centralized IT resource scheduling, heat management, and
energy consumption management, reducing maintenance costs.
l FusionCompute dynamically schedules resources based the load of servers and services,
achieving load balancing across servers and service provisioning systems and ensuring
optimal system response and user experience.

Rights Management
FusionCompute provides rights management and allows users to manage system resources
based on their roles and rights.

Comprehensive O&M
FusionCompute provides various operation and maintenance (O&M) tools to control and
manage services, improving O&M efficiency. FusionCompute provides the following
operation and maintenance tools:
l Black box
The black box enables carriers or enterprises to rapidly locate faults based on logs and
program heaps. It reduces the time to locate fault and improves O&M efficiency.
l Automatic health check

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 4


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 1 Overview

The automatic health check helps FusionCompute automatically detect system faults in a
timely manner and generate alarms, ensuring timely O&M of VMs.
l Web interfaces
FusionCompute provides web interfaces, through which users can monitor and manage
all hardware resources, virtual resources, and service provisioning.

Cloud Security
FusionCompute complies with local information security laws and regulations. It adopts
various security measures and policies to provide end-to-end protection to user access,
management and maintenance, data, networks, and virtualization.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 5


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 2 Product Architecture

2 Product Architecture

About This Chapter

2.1 Software Components


2.2 Interfaces and Protocols

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 6


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 2 Product Architecture

2.1 Software Components


Figure 2-1 shows the architecture of FusionCompute.

Figure 2-1 Architecture of FusionCompute

FusionManager

REST

VRM

SOAP

CNA
FusionCompute

CNA: Computing Node Agent VRM: Virtualization Resource Management

Table 2-1 describes the functions of FusionCompute components.

Table 2-1 Functions of FusionCompute components


Module Function

CNA The CNA provides the following functions:


l Implements the virtual computing
function.
l Manages the VMs running on the CNA.
l Manages the computing, storage, and
network resources of the CNA.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 7


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 2 Product Architecture

Module Function

VRM The VRM provides the following functions:


l Manages block storage resources in the
cluster.
l Allocates private IP addresses for virtual
machines (VMs) using Dynamic Host
Configuration Protocol (DHCP).
l Manages nodes in the computing cluster
and maps physical computing resources
to virtual computing resources.
l Manages network resources, such as IP
addresses, virtual local area network
(VLAN) numbers, and DHCP severs in
the cluster and allocates IP addresses to
VMs.
l Manages the life cycle of VMs in the
cluster and distributes and migrates VMs
across CNAs.
l Dynamically adjusts resources in the
cluster.
l Implements centralized management of
virtual resources and user data and
provides elastic computing, storage, and
IP address services.
l Allows O&M engineers to remotely
access FusionCompute through a web
interface to perform resource monitoring
and management and view resource
statistics reports.

2.2 Interfaces and Protocols


The FusionCompute provides standard and open protocol interfaces to interwork with various
devices. Figure 2-2 shows the interfaces and protocols supported by the FusionCompute.

Figure 2-2 Interfaces and protocols supported by the FusionCompute

FusionManager

REST

FusionCompute

Table 2-2 describes the FusionCompute interfaces.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 8


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 2 Product Architecture

Table 2-2 FusionCompute interfaces


Interface Name Interface Function Interworki Protocol
ng Entity

External interfaces Allow the FusionManager to obtain FusionMana REST


provided by the configuration and alarm information ger
Virtualization about virtualized resources using
Resource FusionCompute.
Management (VRM) Allow the FusionCompute to obtain
instructions from the FusionManager
to manage VMs.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 9


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

3 Deployment Scheme

About This Chapter

3.1 System Requirements


3.2 Software Deployment Scheme

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 10


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

3.1 System Requirements


Ensure that the PC, servers, storage devices, and networks meet FusionCompute installation
requirements.

PC Requirements
A PC is required for FusionCompute software installation and initial configuration. Table 3-1
lists the PC requirements.

Table 3-1 PC requirements

Item Requirements

CPU Intel or AMD x86 architecture CPU

Memory ≥ 2 GB

Hard disk l The partition for installing the operating system (OS) has more
than 1 GB free space.
l Except the partition for the OS, at least one partition has more than
2 GB free space.

OS The PC runs one of the following OSs of 32-bit or 64-bit:


l Windows XP
l Windows 7
l Windows Server 2003
l Windows Server 2008

Network The PC is properly communicating with the management plane and


the baseboard management controller (BMC) plane of hosts. You are
advised to connect the PC and the hosts to be installed to the same
switch and set their IP addresses to the same management network
segment.

Resolution To improve visual experience in using the FusionCompute installation


wizard, set the PC resolution to 1280p × 1024p or higher. If the PC
runs a Windows 7 OS, after the resolution is set, choose Start >
Control Panel > Appearance and Personalization > Display and
select Smaller or Medium.

Host Requirements
Table 3-2 lists the host requirements.

NOTE

If servers to be used are used before, restore the servers to factory settings before configuring the BIOS.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 11


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

Table 3-2 Host requirements


Item Requirements

CPU Intel or AMD 64-bit CPU


The CPU supports hardware virtualization technology, such as Intel
VT-x or AMD-V, and the CPU virtualization function must be enabled
in the BIOS system.
NOTICE
If the CPU virtualization function is not enabled for a host, VMs cannot be
created on the host.

Memory Minimum memory size: 8 GB


If the host is used to deploy VMs for management nodes, the host
memory must be 3 GB more than the VM memory.
Recommended memory size ≥ 48 GB

Hard disk or USB When hard disks are used, ensure that the hard disk space is at least 16
disk drive GB. If the VRM VM uses the local storage to create disks, the hard
disk space must be at least 96 GB.
When the USB disk drive is used, ensure that its space is at least 4
GB.

Network port l Number of network ports ≥ 1


l Recommended number of network ports: 6
l Recommended network port rate > 1000 Mbit/s
If a host uses an iNIC and the iNIC needs to be replaced, the iNIC
must meet compatibility requirements listed in FusionSphere
V100R005C10SPC700 Version Mapping. If the firmware or drive
version does not meet compatibility requirements, upgrade it by
following the instructions described in the supported hardware device
document.
NOTICE
Do not deploy a common network interface card (NIC) and an intelligent NIC
(iNIC) on the same host. If both common NICs and iNICs are deployed on a
host, common NICs are unavailable.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 12


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

Item Requirements

Redundant array l Configure hard disks 1 and 2 as RAID 1 for installing the host OS
of independent to improve storage reliability.
disks (RAID) When setting the boot device in the host BIOS, set the first boot
device to a RAID 1 disk.
l If the host has multiple disks, you are advised to set up RAID 5
with all the disks except disks 1 and 2.
l If the customer has special requirements on RAID, follow the
requirements.
l If FusionStorage is deployed, some hard disks on hosts are used by
FusionStorage, and other hard disks need to be added as local
storage, then the disks to be added as local storage must be
configured as RAID.
NOTE
The RAID cards on certain servers must be configured with RAID; otherwise,
the host OS cannot be installed. For details about specific requirements for
RAID cards, see the product documentation delivered with the server.

Table 3-3 lists the host BIOS configuration requirements.

Table 3-3 Host BIOS configuration requirements


Item BIOS Configuration

Boot device Set the first boot device to a hard disk or a USB flash drive.
If the first boot device is a hard disk, you are advised to select a RAID
1 disk. If no RAID 1 disk is available, you are advised to retain the
default boot sequence unless the customer has special requirements
for the boot sequence.
NOTICE
Ensure that the first boot device of the host is the location where the host OS is
installed. Otherwise, the host may fail to start or use another OS.

NIC Pre-boot l An onboard NIC driver is used if another OS has been previously
execution installed on the server.
environment l PXE is enabled for NIC1 and disabled for other NICs.
(PXE)
NOTE
l If both common NICs and iNICs are deployed on a host, set PXE to
Enabled for the first iNIC and Disabled for other NICs. Otherwise, the
PXE function may become unavailable.
l After host installation is complete in the system, disable PXE for all the
NICs to prevent mis-installation caused by a PXE server on the
management network when any host restarts.

BIOS clock The BIOS clock is set to the local Coordinated Universal Time
(UTC).
For example, if the local time is Beijing time (UTC +8) 2013-10-20
08:15:20, set the BIOS clock to 2013-10-20 00:15:20.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 13


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

Table 3-4 lists the requirements for advanced CPU configurations of the host BIOS.

Table 3-4 Requirements for advanced CPU configurations of the host BIOS

Configuration Requirement Remarks


Item

Intel HT technology Enabled Intel hyper-threading technology. Enable it to


allow the server to support multithreading,
thereby improving CPU performance.

Intel Virtualization Enabled CPU virtualization technology. Enable it to


tech allow the CPUs on the server to support
virtualization.

Execute Disable Bit Enabled Hardware-based security function, which is


displayed as NX or XD on some servers.
Enable it to prevent the server from restarting
due to exceptions.

Intel SpeedStep Disabled CPU working mode switching technology,


tech which is displayed as EIST on newly
developed servers. Disable it to prevent disk
or NIC failures.

C-State Disabled CPU power-saving function. Disable it to


prevent disk or NIC failures and clock
inaccuracy.

NOTE
The configuration item name may vary depending on different servers or BIOS versions. Therefore,
check the configuration item information before configuration. If a server does not support a technology
or function, do not configure the function.

Management Node Requirements


VRM VM specifications vary, depending on system capacity. Table 3-5 lists VRM VM
specifications.

Table 3-5 VRM VM specifications

System Capacity VRM VM Specifications VRM Node Specifications


When FusionCompute Is
Connected to a Non-
FusionSphere Management
Platform

200 VMs on 20 l Number of CPUs ≥ 4 l Number of CPUs ≥ 4


physical servers l Memory size ≥ 5 GB l Memory size ≥ 5 GB
l Disk size ≥ 80 GB l Disk size ≥ 80 GB

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 14


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

System Capacity VRM VM Specifications VRM Node Specifications


When FusionCompute Is
Connected to a Non-
FusionSphere Management
Platform

1000 VMs on 50 l Number of CPUs ≥ 4 l Number of CPUs ≥ 8


physical servers l Memory size ≥ 5 GB l Memory size ≥ 8 GB
l Disk size ≥ 80 GB l Disk size ≥ 80 GB

3000 VMs on 100 l Number of CPUs ≥ 8 l Number of CPUs ≥ 12


physical servers l Memory size ≥ 8 GB l Memory size ≥ 16 GB
NOTE
l Disk size ≥ 80 GB l Disk size ≥ 80 GB
It is recommended that
VRM nodes are
deployed on physical
servers.

5000 VMs on 200 l Number of CPUs ≥ 12 l Number of CPUs ≥ 20


physical servers l Memory size ≥ 16 GB l Memory size ≥ 30 GB
NOTE
l Disk size ≥ 80 GB l Disk size ≥ 80 GB
It is recommended that
VRM nodes are
deployed on physical
servers.

10000 VMs on 1000 l Number of CPUs ≥ 20 l Number of CPUs ≥ 36


physical servers l Memory size ≥ 30 GB l Memory size ≥ 60 GB
NOTE
l Disk size ≥ 80 GB l Disk size ≥ 80 GB
The capacity is
supported only when
the VRM nodes are
deployed on physical
servers.

NOTE

If the VRM node is deployed on a VM, set the space of the system disk on the VRM VM to 80 GB.
If the VRM VM uses local storage on the host, you are advised to set the disk using RAID 1 on the host
(for example, the disk where the host OS is installed) to a data store and create the VRM VM using the
data store to improve VRM VM reliability.

Storage Device Requirements


l Shared storage devices
Shared storage devices include storage area network (SAN) devices, advanced SAN
devices, and network attached storage (NAS) devices. If shared storage devices are used,
configure the management IP addresses and storage IP addresses for the shared storage
devices. In addition, the following conditions must be met for specific storage devices:
– If SAN or advanced SAN devices are used, configure logical unit numbers (LUNs)
or storage pools and map them to hosts.
– If advanced SAN devices are used, create an administrator account for installing the
FusionCompute in addition to admin.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 15


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

– If multiple IP SAN devices are used, configure the cascading between the IP SAN
devices after software installation.
– If NAS devices are used, configure the shared directories (data stores) and a list of
hosts that can access the shared directories.
– The operating system (OS) compatibility of some non-Huawei SAN devices varies
depending on LUN spaces. For example, if the storage space of a LUN on a certain
SAN device is greater than 2 TB, certain OSs can identify only 2 TB storage space
on the LUN. Therefore, read the storage device product documentation to
understand the Novell SUSE Linux OS compatibility of the non-Huawei SAN
devices before you use the devices.
– If SAN devices are used, use Internet Small Computer Systems Interface (iSCSI) to
connect hosts and storage devices. The iSCSI connection does not require
additional switches, thereby reducing costs.
l Local storage resources
If local storage resources are used, only the free space of the disk on which the host OS
is installed and other bare disks can be used as data stores.
NOTE

Local storage resources are provided only to the host on which the local disks are located. Note the
following points if local storage resources are used:
l If the system uses only the non-virtualized local storage resources, VM migration cannot be
performed.
l Configure local storage resources based on the host computing capability to prevent excess storage
resources when all computing resources on a host are used up.
You are advised to deploy shared storage for service VMs.

Network Requirements
The Simple Network Management Protocol (SNMP) and Secure Shell (SSH) are required for
the switch to enhance security. For SNMP, V3 is recommended.
The Spanning Tree Protocol (STP) protocol is disabled on the switch. Otherwise, an alarm
claiming that the host is faulty may be wrongly reported.
Table 3-6 lists the requirements for communication between network planes in the system.

Table 3-6 Requirements for each network plane


Communication Description Requirement
Plane

Baseboard Specifies the plane used by the Communication between the


management BMC network port on the host. management plane and the BMC
controller (BMC) This plane enables the remote plane of the Virtual Resource
plane access to the BMC system on a Management (VRM) node is
server. normal. The management plane
and the BMC plane can be
combined.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 16


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

Communication Description Requirement


Plane

Management Specifies the plane used by the Communication between VRMs


plane management system that manages and other Computing Node Agent
all nodes in a centralized manner. (CNA) nodes on the management
All nodes communicate on this plane is normal.
plane, which provides the
following IP addresses:
l Management IP addresses of
all hosts, that is, IP addresses
of the management network
ports on hosts.
l IP addresses of VMs on which
management nodes are
deployed.
l IP addresses of storage device
controllers.
NOTE
l The management plane is
accessible to the IP addresses in
all network segments by default,
because the network plans of
different customers vary.
Therefore, you are advised to
configure the physical firewall to
deny the access from IP
addresses that are not planned to
communicate with the
management plane.
l The management IP addresses of
both the active and standby
VRM nodes must be set with
same rules if you use the firewall
to set access rules for the VRM
floating IP address.
l On the FusionCompute
management plane, some ports
provide management services for
external networks. If the
management plane is deployed
on an untrusted network, the
plane is prone to denial of
service (DoS) and distributed
denial of service (DDoS) attacks.
Therefore, deploy this
management plane on a private
network or in the trust zone of
the firewall, protecting the
FusionCompute system from
external attacks.
You are advised to configure the
eth0 on a host to the management
network port. If a host has more
than four network ports, you are

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 17


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

Communication Description Requirement


Plane

advised to configure both eth0


and eth1 on the host to the
management network ports, and
bind them after the
FusionCompute is installed so
that they can work in active/
standby mode.

Storage plane Specifies the plane on which Communication between hosts


hosts and storage units on storage and storage devices on the
devices communicate. This plane storage plane is normal.
provides the following IP
addresses:
l Storage IP addresses of all
hosts, that is, IP addresses of
the storage network ports on
hosts.
l Storage IP addresses of
storage devices.
If the multipathing mode is in
use, multiple VLANs must be
configured for the storage plane.

Service plane Specifies the plane used by user Communication between VRMs
VMs on which services are and host on the service plane is
deployed. normal if VRM nodes are
required to assign IP addresses to
service plane NICs.

3.2 Software Deployment Scheme


Logical Nodes
Figure 3-1 shows the logical nodes in the FusionCompute.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 18


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

Figure 3-1 FusionCompute logical nodes

Site Cluster 1
Management Computing nodes
nodes
Host Host Host
VRM (active)

(Host)

VRM (standby) Cluster 2


Computing nodes
Host Host Host

(Host) …

Storage

resources
Cluster n
Computing nodes
Host Host Host

NOTE
Storage resources can be provided by storage area network (SAN) devices, network attached storage
(NAS) devices, or local storage devices.

Table 3-7 describes the logical nodes in the FusionCompute.

Table 3-7 FusionCompute nodes


Node Description

Virtualization A node that implements centralized management of virtual resources.


Resource
Management
(VRM)

Host A physical server that provides computing resources for the


FusionCompute. Certain hosts can also provide storage resources.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 19


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 3 Deployment Scheme

Deployment Scheme
Table 3-8 describes the FusionCompute management modes deployment schemes.

Table 3-8 FusionCompute deployment schemes


Node Deployment Deployment Rule
Mode

Host Deployed on Multiple hosts can be deployed based on customer


servers. requirements for computing resources. Certain hosts
can also provide storage resources.
In virtualization deployment, a host must be specified
for creating a VRM VM.
If a small number of hosts (for example, less than 10)
are deployed, add all the hosts to the management
cluster. If a large number of hosts are deployed, create
one or more service clusters for different service types.
To optimize computing resource utilization of each
cluster, configure the same type of data stores and
distributed virtual switches (DVSs) for hosts in the
same cluster.

VRM Deployed on The active and standby VRMs must be deployed on


VMs. two VMs on different hosts in the management cluster.
You are advised to deploy VRMs on VMs.

Deployed on The active and standby VRMs must be deployed on


servers. different physical servers.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 20


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

4 Product Functions

About This Chapter

4.1 Virtual Computing


4.2 Virtual Network
4.3 Virtual Storage
4.4 Compatibility
4.5 Availability
4.6 Security

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 21


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

4.1 Virtual Computing


Server Virtualization
Server virtualization enables physical server resources to be converted to logical resources.
With virtualization technology, a server can be divided into multiple virtual computing
resources that are isolated with each other. CPU, memory, disks, and I/O resources become
pooled resources that are dynamically managed. Server virtualization increases resource
utilization rate, simplifies system management, and implements server integration. In
addition, the hardware-assisted virtualization technology increases virtualization efficiency
and enhances VM security.
Server virtualization involves the following features:
l Bare metal architecture
FusionCompute hypervisor adopts the bare-metal architecture and can directly run on
servers to virtualize hardware resources. The bare metal architecture ensures that VMs
have near-native performance, high reliability, and scalability.
l CPU virtualization
FusionCompute converts physical CPUs to virtual CPUs (vCPU) for VMs. When
multiple vCPUs are running, FusionCompute dynamically allocates CPU capabilities
among the vCPUs. One VM support a maximum of 64 vCPUs.
l Memory virtualization
FusionCompute adopts the hardware-assisted virtualization technology to improve the
memory access performance by 30%. It also adopts memory overcommitment
technologies to maximize the memory utilization. One VM support a maximum of 1 TB
virtual memory. FusionCompute supports the following memory overcommitment
technologies:
– Memory ballooning: The system dynamically reclaims the free memory from a VM
and allocates it to other VMs. Applications on the VMs are not aware of memory
reclamation and allocation. The total amount of memory used by all VMs on a
physical server cannot exceed the amount of the physical memory.
– Memory swapping: The system swaps out data on the reserved VM memory to an
external storage file to free the reserved memory and get back the data when
required.
– Memory sharing: Multiple VMs share the memory page on which the data content
is zero.
l GPU passthrough
In FusionCompute, a Graphic Processing Unit (GPU) on a physical server can be directly
attached to a specified VM to improve VM graphic processing capabilities.
l iNIC passthrough
In the FusionCompute system, an intelligent network interface card (iNIC) on a physical
server can be virtualized and then be attached to multiple VMs to improve network
performance. VMs with iNICs attached can be only manually migrated to hosts using
iNICs in the same cluster.
l USB passthrough
In FusionCompute, a USB device on a physical server can be directly attached to a
specified VM. This feature allows users to use USB devices in virtualization scenarios.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 22


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

VM Resource Management
VM Resource Management allows administrators to create VMs using a VM template or in a
custom manner, and manage cluster resources. This feature provides the following functions:
automatic resource scheduling (including load balancing mode and dynamic energy-saving
mode), VM life cycle management (including creating, deleting, starting, restarting,
hibernating, and waking up VMs), storage resource management (including managing
common disks and shared disks), VM security management (including using custom
VLANs), and online VM QoS adjustment (including setting CPU QoS and memory QoS).
l VM life cycle management
The VM life cycle management function allows users to adjust the VM status based on
service load. User can perform the following operations to a VM:
– Create, delete, start, stop, restart, or query a VM.
After receiving a VM creation request, FusionCompute selects proper physical
resources to create the VM based on the specified requirements. The requirements
include the VM specifications (such as the number of vCPUs, memory size, and
system disk size), image specifications, and network specifications.
After the VM is created, FusionCompute monitors the VM running status and its
attributes.
Users can stop, restart, and delete VMs as required.
– Hibernate or wake up a VM.
Users can hibernate idle VMs when the service load is light and wake up the
hibernated VMs when the service load is heavy. This improves system resource
utilization.
l VM template management
VM templates can be customized for creating VMs.
l CPU Quality of service (QoS)
The CPU QoS ensures optimal allocation of computing resources for VMs and prevents
resource contention between VMs due to different service requirements. It effectively
increases resource utilization and reduces costs.
During creation of VMs, the CPU QoS is specified based on the service to be deployed.
After the VMs are created, the dynamically binds the vCPUs to physical CPUs based on
the CPU QoS. In this way, a pool of physical CPUs that are bound to different vCPUs
with the same CPU QoS is created on a server.
The CPU QoS determines the VM computing power. The system ensures the VM CPU
QoS by setting the minimum computing capability and the computing capability upper
limit for VMs.
CPU QoS contain the following parameters:
– CPU quota
CPU quota defines the proportion based on which CPU resources to be allocated to
each VM when multiple VMs compete for physical CPU resources.
This section uses a host (physical server) that uses a single-core, 2.8 GHz CPU as
an example to describe how CPU quota works. Three VMs (A, B, and C) run on the
host, and their quotas are set to 1000, 2000, and 4000, respectively. When the CPU
workloads of the VMs are heavy, the system allocates CPU resources to the VMs
based on the CPU quotas. VM A with 1000 CPU quota can obtain a computing
capability of 400 MHz. VM B with 2000 CPU quota can obtain a computing
capability of 800 MHz. VM C with 4000 CPU quota can obtain a computing

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 23


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

capability of 1600 MHz. The computing capability calculation is more complex in


actual use.
The CPU quota takes effect only when resource contention occurs among VMs. If
the CPU resources are sufficient, a VM can exclusively use physical CPU resources
on the host if required. For example, if VMs B and C are idle, VM A can obtain all
of the 2.8 GHz computing capability.
– CPU reservation
CPU reservation defines the minimum CPU resources to be allocated to each VM
when multiple VMs compete for physical CPU resources.
If the computing capability calculated based on the CPU quota of a VM is less than
the CPU reservation value, the system allocates the computing capability to the VM
according to the CPU reservation value. The offset between the computing
capability calculated based on the CPU quota and the CPU reservation value is
deducted from computing capability of other VMs based on their CPU quotas and is
added to the VM.
If the computing capability calculated based on the CPU quota of a VM is greater
than the CPU reservation value, the system allocates the capability to the VM
according to the CPU quota.
For example, three VMs (A, B, and C) run on the host that uses a single-core
physical CPU, their quotas are set to 1000, 2000, and 4000, respectively, and their
CPU reservation values are set to 700 MHz, 0 MHz, and 0 MHz, respectively.
When the CPU workloads of the three VMs are heavy:
n According to the VM A CPU quota, VM A should have obtained a computing
capability of 400 MHz. However, its CPU reservation value is greater than 400
MHz. Therefore, VM A obtains a computing capability of 700 MHz according
to its CPU reservation value.
n The system deducts the offset (700 MHz minus 400 MHz) from VMs B and C
based on their CPU quota.
n VM B obtains a computing capability of 700 (800 minus 100) MHz, and VM
C obtains a computing capability of 1400 (1600 minus 200) MHz.
The CPU reservation takes effect only when resource contention occurs among
VMs. If the CPU resources are sufficient, a VM can exclusively use physical CPU
resources on the host if required. For example, if VMs B and C are idle, VM A can
obtain all of the 2.8 GHz computing capability.
– CPU limit
CPU limit defines the upper limit of physical resources that can be used by a VM.
For example, If a VM with two virtual CPUs has a CPU limit of 3 GHz, each virtual
CPU of the VM can obtain a maximum of 1.5 GHz computing resources.
l Memory QoS
Memory QoS allows VM memory to be intelligently allocated based on the preset
percentage of reserved memory. Memory overcommitment technologies, such as
memory ballooning, are used to provide more virtual memory resources. Users are
unaware of the memory overcommitment.
The user can set the reserved memory percentage based on service requirements. The
main principle of memory overcommitment is to first use the physical memory.
Memory QoS contain the following parameters:
– Memory quota

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 24


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

Memory quota defines the proportion based on which memory resources to be


allocated to each VM when multiple VMs compete for physical memory resources.
The system allocates memory resources to VMs based on the proportion when VMs
apply for memory resources or hosts release free memory resources (such as when
VMs are migrated or stopped).
CPU resources can be scheduled in real time. Memory resources are scheduled
subtly and continuously when VMs are running until the configured VM memory
resources are allocated to VMs.
For example, three 4 GB memory VMs run on a 6 GB memory host, and their
memory quotas are set to 20480, 20480, and 40960, respectively. In this case, the
memory allocation ratio is 1:1:2. When the memory workloads on the three VMs
gradually increase, the system subtly adjusts memory resources on the VMs based
on the memory quotas until the VMs obtain 1.5 GB, 1.5 GB, and 3 GB memory,
respectively.
The memory quota takes effect only when resource contention occurs among VMs.
If the memory resources are sufficient, a VM can exclusively use physical memory
resources on the host if required. For example, if the memory resources required by
VMs B and C are less than the reserved memory values, and VM A has more
memory workloads to handle, VM A can use memory resources from free memory
resources, and memory resources on VMs B and C, until the memory resources
obtained by VM A reach the upper limit, or the free memory resources are used up
and memory resources on VMs B and C drop to the reserved values. For example, if
VM C is not under memory pressure and has 1 GB memory reserved, VMs A and B
theoretically can obtain a maximum of 2.5 GB memory resources each.
– Memory reservation
Memory reservation defines the minimum memory resources to be allocated to each
VM when multiple VMs compete for memory resources.
A VM exclusively uses its reserved memory, that is, if certain memory resources
are reserved for a VM, other VMs cannot use the memory resources even if the
memory resources are idle.
l Cluster resource management, including dynamic resource scheduling for load balancing
or energy saving.
When detecting an idle VM, the system releases some memory and CPU resources of the
VM to the virtual resource pool based on the preset conditions. Users can monitor the
dynamic resources on FusionCompute.
l Storage resource management, such as system disk, user disk, and shared disk
management.
l VM security management, such as virtual local area network (LAN) customization and
security group selection.
l VM statistics
The system collects information about the resource usage for user VMs and disks.

Dynamic VM Resource Adjustment


FusionCompute dynamic VM resource adjustment allows users to perform the following
operations:
l Adjusting the number of vCPUs for VMs in the running or stopped state

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 25


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

Users can add or delete vCPUs for VMs based on the service load, irrespective of
whether the VMs are running or stopped. This allows computing resources to be adjusted
in a timely manner.
l Adjusting the memory size for VMs in the running or stopped state
Users can increase or decrease the memory size for VMs based on the service load,
irrespective of whether the VMs are running or stopped. This allows memory resources
to be adjusted in a timely manner.
l Adding or deleting NICs for VMs in the running or stopped state
Users can add or delete virtual NICs for running or stopped VMs to meet service
requirement for NICs.
l Attaching virtual disks for VMs in the running or stopped state
Users can expand the storage capacity for VMs, irrespective of whether the VMs are
running or stopped.
NOTE

When a VM uses virtualized storage and is in the running or stopped state, users can expand the
VM storage capacity by enlarging the capacity of existing disks on the VM.

Distributed Resource Scheduling and Power Management


FusionCompute provides various pooled virtual resources, such as computing resources,
storage resources, and virtual network resources. The FusionCompute intelligently schedules
the virtual resources based on the system load to ensure optimal resource allocation as well as
high reliability and availability.
FusionCompute supports the following type of resource scheduling:
l Resource scheduling for load balancing
When detecting that the load on servers in a cluster varies significantly and exceeds the
preset thresholds, the system automatically migrates VMs based on the predefined load
balancing policy to achieve load balancing.
l Resource scheduling for energy saving
Resource scheduling for energy saving can be enabled only after resource schedule for
load balancing is enabled. When detecting that the load on a cluster is light, the system
automatically migrates VMs to some servers based on the predefined energy saving
policy and powers off the idle servers.

VM Live Migration
FusionCompute supports VM migration between the hosts that share the same data stores
without interrupting services. This reduces the service interruption time caused by server
maintenance and saves energy for data centers.

4.2 Virtual Network


Virtual NIC
Each virtual network interface card (NIC) has an IP address and a MAC address. It has the
same functions as a physical NIC on a network. FusionCompute supports intelligent NICs
(iNICs), which use multiple queues, virtual swapping, quality of service (QoS), and uplink
aggregation to improve NIC I/O performance.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 26


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

Network I/O Control


The network QoS policy enables bandwidth configuration control.
l Transmit bandwidth control based on a network plane
The management plane, storage plane, and service plane are allocated with specified
bandwidth based on the physical bandwidth resources. The traffic congestion on a plane
does not affect I/O on other planes.
l Transmit and receive bandwidth control based on a port group member port
Traffic shaping and bandwidth priority are configured for each port in a port group to
ensure network QoS.

The QoS function does not support traffic control among VMs on the same host.

DVS
Each host connects to a distributed virtual switch (DVS), which functions as a physical
switch. The DVS connects to VMs through a virtual port in the downstream direction and to
the host NIC in the upstream direction. The DVS implements network communication
between hosts and VMs.

In addition, the DVS ensures unchanged network configuration for VMs when the VMs are
migrated across hosts.

Support for IPv6


The system allows service VMs to communicate with each other over IPv6 networks. The
VMs supports both single-stack (IPv6 or IPv4) and dual-stack (IPv4 and IPv6) networks.

Dual-stack is defined in RFC 4213. Both IPv4 and IPv6 protocols run on the both terminal
devices and network nodes, thereby implementing communication between IPv4 and IPv6
nodes. Nodes that have both IPv4 and IPv6 stacks deployed are named dual-stack nodes. They
can receive and send both IPv4 and IPv6 packets, and can communicate with IPv4 nodes over
the IPv4 network and communicate with IPv6 nodes over the IPv6 network.

The port on a dual-stack device can have only one IPv4 or IPv6 address configured, or have
both IPv4 and IPv6 addresses configured.

To assign an IPv6 address to a VM, you can deploy a third-party DHCPv6 server, use a
hardware gateway to implement stateless automatic assignment, or uses static IP address
injection.

4.3 Virtual Storage


Virtual Storage Management
Storage virtualization abstracts resources on storage devices into data stores. Data stores are
logical containers that hide the peculiarities of physical storage devices from VMs and
provide a unified model for storing VM files. Storage virtualization helps the system better
manage virtual infrastructure storage resources with improved resource utilization and
flexibility and increased application uptime.

The following storage units can be encapsulated as data stores:

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 27


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

l Logical unit numbers (LUNs) on storage area network (SAN) storage, including Internet
Small Computer Systems Interface (iSCSI) and fibre channel (FC) SAN storage
l File systems on network attached storage (NAS) devices
l FusionStorage storage resource pools
l Local hard disks
l Local RAM disks
Data stores support the following file system formats:
l Virtual Image Management System (VIMS)
The VIMS is a high-performance file system that is designed for storing VM files. The
VIMS data can be stored on any Small Computer System Interface (SCSI)-based local or
shared storage device, such as FC, Fibre Channel over Ethernet (FCoE), and iSCSI SAN
devices.
l Network File System (NFS)
The NFS runs on NAS devices. FusionSphere supports the NFS V3 protocol. It can
connect to the custom NFS disks on the NFS server and have these disks attached to
meet storage requirements.
l EXT4
FusionSphere supports virtualization of server local disks.

Thin-Provisioning Virtual Storage


Thin-provisioning virtual storage enables flexible, on-demand allocation of storage space,
which improves storage utilization. This function allows more virtual memory space to be
allocated than the physical memory available. The physical memory space is allocated only
for the virtual memory space where data is recorded. The virtual memory space where no data
is recorded does not occupy the physical memory space.
This function is configured for virtual disks. Administrators can set a disk to Common or
Thin-provisioning.
l Storage device independent
This function is not dependent on the operating system (OS) type or hardware of the
storage device. It can be configured for any storage device that runs a virtual image
management system.
l Capacity monitoring
This function enables alarms over data store usage. If the data usage exceeds the preset
threshold, an alarm will be displayed.
l Disk space reclaiming
This function enables disk space monitoring and reclaiming. When the allocated storage
space to a user is large while the actually used space is small, the system can reclaim the
unused space. Only New Technology File System (NTFS) VMs support this function.

VM Snapshot
Users can save the static data of a VM at a specific moment as a snapshot. The data includes
information about all disks attached to the VM at the snapshot-taking moment. The snapshot
can be used to restore the VM to the state it was in when the snapshot was taken. This
function applies to data backup and disaster recovery systems (such as eBackup and UltraVR)
to improve system security and availability.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 28


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

Storage Live Migration


This function enables disks on VMs to be migrated to other storage units when the VMs are
running. The disks can be migrated between different storage devices or storage units on one
storage device under virtual storage management. With this function enabled, storage
resources of VMs can be dynamically migrated, thereby facilitating device maintenance.

4.4 Compatibility
For details about the compatibility for servers, I/O devices, storage devices. and operating
systems (OSs), log in to compatibility check assistant.
Table 4-1 lists OSs that support the PVSCSI.

Table 4-1 OSs that support PVSCSI


Type OS

Windows Windows 2012 DataCenter 64-bit

Windows 2012 Standard 64-bit

Windows 2012 Standard R2 64-bit

Windows 2012 Essentials R2 64-bit

Windows 2012 DataCenter R2 64-bit

Windows Server 2008 Enterprise R2 64-bit

Windows Server 2008 Enterprise R2 SP1 64-bit

Windows Server 2008 Standard R2 64-bit

Windows Server 2008 Standard R2 SP1 64-bit

Windows Server 2008 WEB R2 64-bit

Windows Server 2008 DataCenter R2 64-bit

Windows Server 2008 DataCenter R2 SP1 64-bit

Windows Server 2008 DataCenter SP2 32-bit

Windows Server 2008 Enterprise SP1 32/64-bit

Windows Server 2008 Enterprise SP2 32/64-bit

Windows Server 2008 Standard SP1 32/64-bit

Windows Server 2008 Standard SP2 32/64-bit

Windows Server 2003 Standard R2 SP2 64-bit

Windows Server 2003 Enterprise R2 SP2 64-bit

Windows Server 2003 DataCenter R2 SP2 64-bit

Windows Server 2003 DataCenter SP1 32-bit

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 29


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

Type OS

Windows Server 2003 DataCenter SP2 32-bit

Windows Server 2003 Enterprise SP1 32-bit

Windows Server 2003 Enterprise SP2 32/64-bit

Windows Server 2003 Standard SP1 32-bit

Windows Server 2003 Standard SP2 32/64-bit

Linux Red Hat Enterprise Linux 5.4/5.5 64-bit

Red Hat Enterprise Linux 6.1/6.2/6.4/6.5 64-bit

4.5 Availability
VM Live Migration
In FusionCompute, this feature enables VMs to be migrated from one host to any host across
computing clusters. During the migration, services are not interrupted. If the migration fails,
the VM on the destination server will be destroyed. The user can still use the VM on the
source server. This reduces the service interruption time by migrating VMs from the physical
server to be maintained to another physical server and saving energies for the data center.

VM Fault-based Migration
If a VM becomes faulty, FusionCompute automatically restarts the VM. In the process of
creating VMs, the user can enable the high availability (HA) function to automatically restart
a VM when the VM is faulty. The system periodically checks the status of VMs. When the
system detects that the physical server on which a VM runs is faulty, the system will migrate
the VM to another server and restart the VM so that the VM can be restored in a timely
manner. Because the restarted VM will be recreated and loaded with the operating system like
a physical server, the data that was not saved when the VM encountered the error is lost.

The system can detect errors on the hardware and system software that cause VM failures.

4.6 Security
Virtual Network Access Control
The range of the network VMs connect to can be divided by configured virtual local area
network (VLAN) IDs of network interface cards (NICs) on VMs. Also, the system supports
the Dynamic Host Configuration Protocol (DHCP) quarantine function to improve system
security.
l The port group to which a VM NIC belongs to can be dynamically modified, and thereby
the NIC VLAN ID can also be dynamically changed.
l The DHCP function can be enabled or disabled on the port group to which a VM NIC
belongs to.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 30


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 4 Product Functions

l When the NIC VLAN ID is dynamically changed, the NIC VLAN can also be changed
by binding a new VLAN to the NIC without add a NIC.
l The system also provides the network security function to prevent VMs from invalid
DHCP servers.

Network Plane Security Isolation


The system allows logical interfaces to be created on different network planes, and allows
logical interfaces to be bound with open ports using access control lists (ACLs), so that
network planes for a host can be securely isolated from each other.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 31


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 5 System Principle

5 System Principle

About This Chapter

5.1 Communication Principles


5.2 Time Synchronization Mechanism

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 32


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 5 System Principle

5.1 Communication Principles


Communication Planes
The FusionCompute system consists of the following communication planes:
l Management plane: provides a communication plane to implement system monitoring,
operation and maintenance (including system configuration, system loading, and alarm
reporting), and VM management (such as creating, deleting, and scheduling VMs).
l Storage plane: provides a communication plane for the storage system and storage
resources for VMs. This plane is used for storing and accessing VM data (including data
in the system disk and user disk of VMs).
l Service plane: provides a plane for virtual network interface cards (VNICs) of VMs to
communicate with external devices.
Figure 5-1, Figure 5-2, and Figure 5-3 show the communication between planes in the
FusionCompute system.
NOTE

This section uses IP storage area network (SAN) devices as an example to describe how storage devices
in the FusionCompute system communicate with other planes.

Figure 5-1 Communication between planes (two NICs)

VRM
eth0
BMC
eth1

Management
Service plane
plane

Host eth0
SAN

BMC
Storage A1~A4
eth1
plane B1~B4

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 33


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 5 System Principle

Figure 5-2 Communication between planes (four NICs)

VRM
eth0

BMC

Management
Service plane
plane

Host eth1

eth0
SAN

BMC Storage A1~A4


eth2
plane B1~B4
eth3

Figure 5-3 Communication between planes (six NICs)

VRM
eth0
BMC

Management
Service plane
plane

eth4 eth5

Host bond0
eth0 SAN

eth1
Storage A1~A4
BMC eth2
plane B1~B4
eth3

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 34


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 5 System Principle

NOTE

VLAN Planning Rules


Table 5-1, Table 5-2 and Table 5-3 list the virtual local area network (VLAN) plan for the
planes.

Table 5-1 VLAN plan (two NICs)


Pla Network Ports VLAN Planning Rules
ne

Man Network port eth0 on The network port eth0 on each node are assigned to the
age the host management plane VLAN, which then become the default
men VLAN of the management plane.
t Network port eth0 on
plan the active and standby
e Virtualization
Resource
Management (VRM)
nodes

BMC network ports The switch port connected to the BMC network port on
on the VRM and host each node is assigned to the BMC plane VLAN, which
then becomes the of the default VLAN for the BMC plane.
NOTE
The BMC network ports can be assigned to an independent BMC
plane or to the same VLAN as management network ports. The
specific assignment depends on the actual network plan.

Stor Storage network ports The storage plane is divided into four VLANs:
age A1, A2, A3, A4, B1, l A1 and B1 are assigned to VLAN 1.
plan B2, B3, and B4 on the
e SAN storage devices l A2 and B2 are assigned to VLAN 2.
l A3 and B3 are assigned to VLAN 3.
Storage network port
eth1 on the host l A4 and B4 are assigned to VLAN 4.
l eth1 is assigned to VLAN 1, VLAN 2, VLAN 3 and
VLAN 4.

Serv Service network port The service plane is divided into multiple VLANs to
ice eth0 on the host isolate VMs. All data packets from different VLANs are
plan forwarded over the service network ports on the CNA. The
e data packets are marked with VLAN tags and sent to the
service network port of the switch on the access layer.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 35


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 5 System Principle

Table 5-2 VLAN plan (four NICs)


Pla Network Ports VLAN Planning Rules
ne

Man Network port eth0 on The network port eth0 on each node are assigned to the
age the host management plane VLAN, which then become the default
men VLAN of the management plane.
t Network port eth0 on
plan the active and standby
e VRM nodes

BMC network ports The switch port connected to the BMC network port on
on the VRM and host each node is assigned to the BMC plane VLAN, which
then becomes the of the default VLAN for the BMC plane.
NOTE
The BMC network ports can be assigned to an independent BMC
plane or to the same VLAN as management network ports. The
specific assignment depends on the actual network plan.

Stor Storage network ports The storage plane is divided into four VLANs:
age A1, A2, A3, A4, B1, l A1 and B1 are assigned to VLAN 1.
plan B2, B3, and B4 on the
e SAN storage devices l A2 and B2 are assigned to VLAN 2.
l A3 and B3 are assigned to VLAN 3.
Storage network ports
eth2 and eth3 on the l A4 and B4 are assigned to VLAN 4.
host l eth2 is assigned to VLAN 1 and VLAN 2.
l eth3 is assigned to VLAN 3 and VLAN 4.
The network port eth2 can communicate with ports A1,
A2, B1, and B2 over the layer 2 network. The network port
eth3 can communicate with ports A3, A4, B3, and B4 over
the layer 2 network. This allows computing resources to
access storage resources through multiple paths. (Each
computing server has eight Internet Small Computer
Systems Interface (iSCSI) links to connect to the same
storage device.) Therefore, the storage network reliability
is ensured.

Serv Service network port The service plane is divided into multiple VLANs to
ice eth1 on the host isolate VMs. All data packets from different VLANs are
plan forwarded over the service network ports on the CNA. The
e data packets are marked with VLAN tags and sent to the
service network port of the switch on the access layer.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 36


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 5 System Principle

Table 5-3 VLAN plan (six NICs)


Pl Network Ports Virtual VLAN Planning Rules
an Network
e Port

Ma Network ports bond0 The network ports eth0 and eth1 on each node
na eth0 and eth1 on are assigned to the management plane VLAN,
ge the host which then become the default VLAN of the
me management plane.
nt Network port -
pla eth0 on the active
ne and standby
VRM nodes

BMC network - The switch port connected to the BMC network


ports on the VRM port on each node is assigned to the BMC plane
and host VLAN, which then becomes the of the default
VLAN for the BMC plane.
NOTE
The BMC network ports can be assigned to an
independent BMC plane or to the same VLAN as
management network ports. The specific assignment
depends on network planning.

Sto Storage network - The storage plane is divided into four VLANs:
rag ports A1, A2, A3, l A1 and B1 are assigned to VLAN 1.
e A4, B1, B2, B3,
pla and B4 on the l A2 and B2 are assigned to VLAN 2.
ne SAN storage l A3 and B3 are assigned to VLAN 3.
devices l A4 and B4 are assigned to VLAN 4.
Storage network - l eth2 is assigned to VLAN 1 and VLAN 2.
ports eth2 and l eth3 is assigned to VLAN 3 and VLAN 4.
eth3 on the host
The network port eth2 can communicate with
ports A1, A2, B1, and B2 over the layer 2
network. The network port eth3 can
communicate with ports A3, A4, B3, and B4
over the layer 2 network. This allows computing
resources to access storage resources through
multiple paths. (Each computing server has eight
iSCSI links to connect to the same storage
device.) Therefore, the storage network
reliability is ensured.

Ser Service network - The service plane is divided into multiple


vic ports eth4 and VLANs to isolate VMs. All data packets from
e eth5 on the host different VLANs are forwarded over the service
pla network ports on the CNA. The data packets are
ne marked with VLAN tags and sent to the service
network port of the switch on the access layer.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 37


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 5 System Principle

5.2 Time Synchronization Mechanism


Figure 5-4 shows the time synchronization mechanism of the FusionCompute. Table 5-4 lists
the components involved in FusionCompute time synchronization.

Figure 5-4 Time synchronization mechanism of the FusionCompute

NTP clock source

Host VRM

VM

Table 5-4 Components involved in FusionCompute time synchronization


Component Description

Host To ensure precise system time in the FusionCompute, you are


advised to configure an external NTP clock source to serve hosts
VRM and Virtualization Resource management (VRM) nodes.

VM Users can select a time synchronization policy based on their


specific VM time precision requirements.
l (Recommended) Free clock policy: Users customize a VM time
synchronization configuration, with which VM time is not
affected by the FusionCompute system time. To use this policy,
set the clock policy to not synchronizing time with the host
clock when you create a VM.
l Synchronize time with the host on which the VMs are running:
VM time is determined by the host time. To use this policy, set
the clock policy to synchronizing time with the host clock
when you create a VM.
If a user does not expect VM time to be determined by the
FusionCompute system time or the user is using a reliable clock
source, the free clock policy is recommended.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 38


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 6 Reliability

6 Reliability

About This Chapter

6.1 Software Reliability


6.2 Architecture Reliability

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 39


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 6 Reliability

6.1 Software Reliability


VM HA
The VM high availability (HA) feature ensures quick restoration of a VM. If a VM is faulty,
the system automatically recreates the VM on another normal computing node.
When the system detects that a VM is faulty, the system selects a normal host and recreates
the VM on the host. The VM HA feature protects VMs against the following failures:
l Restart or restoration of a computing node from a power failure
When a computing node restarts or restores from a power failure, the system recreates
the HA VMs on another computing node.
l Blue screen of death (BSOD) of a VM
When the system detects that BSOD occurs on a VM and the handling policy configured
for this error is HA, the system creates the VM on another normal computing node.

VM Live Migration
The live migration feature allows users to migrate VMs from one physical server to another
physical server without interrupting services. The VM manager provides quick recovery of
memory data and memory sharing technologies to ensure that the VM data remains
unchanged before and after the live migration. The VM live migration applies to the following
scenarios:
l Before performing operation and maintenance (O&M) operations on a physical server,
system maintenance engineers can relocate VMs from this physical server to another
physical server. This minimizes risk of service interruption during the O&M process.
l Before upgrading a physical server, system maintenance engineers can relocate VMs
from this physical server to other physical servers. This minimizes risk of service
interruption during the upgrade process. After the upgrade is complete, system
maintenance engineers can relocate the VMs to the original physical server.
l System maintenance engineers can relocate VMs from a light-loaded server to other
servers and then power off the server. This helps reduce service operation costs.
Table 6-1 describes the types of VM live migration.

Table 6-1 Types of VM live migration


Migration Type Subclass Description

Manual migration By destination On the FusionCompute,


system maintenance
engineers manually relocate
one VM to another server.

Automatic migration VM resource scheduling The system automatically


relocates VMs to other
servers in the cluster based
on the preset VM scheduling
policies.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 40


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 6 Reliability

VM Load Balancing
In the load balancing mode, the system dynamically allocates the load based on the current
load status of each physical server node to implements load balance in a cluster.

Snapshot
The snapshot feature enables the FusionCompute to restore a damaged VM by using its
snapshots.
A snapshot is a set of system files and directories of a VM kept in storage as they were some
time in the past.
l When a VM is faulty, a user can quickly create a VM based on the backed-up VM
snapshot.
l A user can also restore a VM to the time the snapshot is created.

VM Isolation
The isolation feature ensures that all VMs running on the same physical server are
independent. Therefore, the faulty VM does not affect other VMs.
VM isolation is implemented based on virtualization software. Each VM has independent
memory space, network address space, CPU stack register, and disk storage space.

VM OS Fault Detection
If a VM becomes faulty, the system automatically restarts the faulty VM from the physical
server where the VM is located or from another physical server, depending on the preset
policy. Users can also configure the system to neglect the faults. The system can detect and
address internal errors of VM OSs, such as the blue screen of death (BSOD) on Windows
VMs and the panic status of Linux VMs.

Black Box
The black box embedded in the FusionCompute collects information about the system. If a
fault occurs, the black box collects and stores the last information about the system. This
facilitates fault location.
The black box stores the following information:
l Storage kernel logs
l System snapshots
l Screen output information before the system exits
l Diagnosis information from the diagnosis tool

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 41


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 6 Reliability

6.2 Architecture Reliability


Management Node HA
Management nodes work in active/standby mode to ensure high availability (HA). If the
active node is faulty, the standby node takes over services from the active node, ensuring
uninterrupted service processing of management nodes.

The active and standby nodes check the status of each other using the heartbeat messages sent
over the management plane. The active node is automatically determined based on the
heartbeat messages.
l Only the active node provides services. The standby node only provides basic functions
and periodically synchronizes data with the active node.
l If the active node is faulty, the standby node takes over services from the active node and
changes to the active state. The original active node changes to the idle state.
The active node faults include the network interruption, abnormal state, or faulty service
process of the active node.

Management Data Backup and Restoration


The system backs up the configuration data and service data periodically on local and remote
devices. If the management node service becomes abnormal and cannot be automatically
restored, it can be restored using the local data backup rapidly. If a devastating fault occurs
and both the active and standby management nodes are faulty at the same time, and they
cannot be restored by restarting, they can be restored using the remote data backup rapidly
(within 1 hour). With this service, the time for restoration is reduced.

Traffic Control
The traffic control mechanism helps the management node provide concurrent services of
high availability without system collapse duo to excessive traffic. The traffic control is
enabled for the access point, so that excessive load on the front end can be prevented to
enhance system stability. To prevent service failures due excessive traffic, this function is also
enabled for each key internal process in the system, such as traffic control on image
downloading, authentication, VM services (including VM migration, VM high availability,
VM creation, hibernation, waking up, and stopping), and operation and maintenance (O&M).

Fault Detection
The system provides the fault detection and alarm functions, and the tool for displaying fault
on web browsers. When a cluster is running, users can monitor cluster management and load
balancing by using a data visualization tool to detect faults, including load balancing
problems, abnormal processes, or hardware performance deterioration trend. Users can view
historical record to obtain the information about daily, weekly, and even annual hardware
resource consumption.

Data Consistency Check


The FusionCompute periodically performs data consistency checks to ensure data consistency.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 42


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 6 Reliability

The FusionCompute periodically checks consistency of all VM data and disk file data on
management nodes. If data inconsistency is found, the system generates an audit log. The
maintenance engineers can clear the data inconsistency based on the log.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 43


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 7 Technical Specifications

7 Technical Specifications

Management Capability

Table 7-1 Management capability


Item Specifications

Maximum hosts per Virtualization Resource 1024


Management (VRM) node

Maximum sites per VRM domain 16

Maximum clusters per VRM node 32

Maximum VMs per VRM node l Number of started VMs: 10,000


l Number of registered VMs: 30,000

Maximum hosts per cluster l Maximum number of hosts using non-


virtualized data stores: 128
l Maximum number of hosts using
virtualized data stores: 64

Host Specifications

Table 7-2 Host specifications


Item Specifications

Maximum logical CPUs per host 4095

Maximum vCPUs per host 8192

Maximum memory size per host 16 TB

Maximum VMs per host 2048

Maximum concurrent live migrated VMs 8


per host

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 44


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 7 Technical Specifications

VM Capacity

Table 7-3 VM capacity


Item Specifications

Maximum VMs per cluster 3000

Disk Capacity

Table 7-4 Disk capacity


Item Specifications

Maximum disks per VRM node 120,000

Snapshot Capacity

Table 7-5 Snapshot capacity


Item Specifications

Maximum snapshots per system 200,000

Maximum snapshots per VM 32

Network Capacity

Table 7-6 Network capacity


Item Specifications

Maximum distributed virtual switches 128


(DVSs) per system

Maximum hosts per DVS 1024

Maximum port groups per DVS 80,000

Maximum virtual switch ports per DVS l Standard mode: 2048 x Number of hosts
managed by a DVS
l VMDq-enabled mode: 250 x Number of
hosts managed by a DVS

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 45


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description 7 Technical Specifications

VM Specifications

Table 7-7 VM specifications


Item Specifications

Maximum vCPUs per VM 160

Maximum virtual NICs per VM 12

Maximum disks per VM 60

Maximum memory size per VM 1023GB

Maximum capacity of a single disk per VM 64 TB


(using virtualized storage)

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 46


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

A Glossary

A.1 A-E
A.2 F-J
A.3 K-O
A.4 P-T
A.5 U-Z

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 47


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

A.1 A-E
A
active directory A directory service created by Microsoft for Windows domain networks. It is included
in most Windows Server operating systems, such as Windows Standard Server,
Windows Enterprise Server, and Windows Datacenter Server.
AD See active directory

B
bare VM A VM that has an identity but does not occupy any CPU, memory, storage, or network
resource in the system.
Baseboard A dedicated micro controller embedded in the main board of a computer (especially a
Management server).
Controller
BMC See Baseboard Management Controller

C
CBT See Changed Block Tracking
Changed Block An incremental data backup function. With this function enabled, the system uses a
Tracking bitmap to keep track of VM storage blocks as they change following the last backup.
Therefore, the system only backs up the data blocks that have been changed since the
last backup.
CNA See Computing Node Agent
Computing Node This is deployed on a computing node and used to manage the VMs and VM
Agent mounting on the computing node.

D
disk The logical storage disk of a VM, which can either be a system disk or user disk.
distributed virtual A virtual switch (created on a physical server) that uses software to implement data
switch switching between VMs on the same or different servers.
Distributed Virtual A module used to manage distributed virtual switches (DVSs). Deployed in the same
Switch Management cluster with the Virtual Resource Management (VRM) node, the DVSM creates,
deletes, maintains, and presents DVSs in the system. Each cluster has a DVSM
module.
Dom0 See Domain 0
Domain Domain includes Dom0 and DomU.
Domain 0 A modified Linux kernel and the only VM that operates on the Xen Hypervisor. Dom0
can access physical I/O resources and interwork with other VMs operating on the
system. Dom0 must be started before other domains.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 48


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

Domain U Paravirtualized VMs operating on the Xen Hypervisor are called Domain U PV
Guests, which supports the operating system whose kernel has been modified, such as
Linux, Solaris, FreeBSD, and other UNIX operating systems. Fully virtualized VMs
are called Domain U HVM Guests, which supports the operating system whose kernel
does not need to be modified, for example, Windows.
DomU See Domain U
DPM See Dynamic Power Management
DRS See Dynamic Resource Scheduler
DVS See distributed virtual switch
DVSM See Distributed Virtual Switch Management
Dynamic Power A module that intelligently powers on or off idle physical servers based on the system
Management load on the network.
Dynamic Resource A module that uses intelligent scheduling algorithms to flexibly schedule resources
Scheduler and dynamically balance system load to improve user experience.

E
Elastic Load Balancer A component that provides load balancing services for tenants. End users can apply
for an ELB and associate their hosts with the ELB. The ELB evenly distributes service
requests to the associated hosts based on customized load balancing policies. The ELB
helps improve service stability and reliability.
Elastic Service A point from which to control VM resources and virtual block storage resources. It
Controller provides an open ECi interface.
elastic virtual switch A virtual switch that implements data switching, virtual local area network (VLAN)
isolation, Dynamic Host Configuration Protocol (DHCP) isolation, bandwidth
limiting, and priority setting.
ELB See Elastic Load Balancer
Equipment Serial This uniquely identifies a set of equipment.
Number
ESN See Equipment Serial Number
EVS See elastic virtual switch

A.2 F-J
F
FCSAN See fibre channel storage area network
fiber channel storage A type of storage area network (SAN) that uses fiber channels between servers and
area network storage devices. FC SAN devices provide high performance but high costs, and are
gradually replaced by IP SAN devices.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 49


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

full clone Full copy of the consolidated sum of delta disks and base disk of a virtual machine.
Each full clone is entirely separated from the parent VM and can have different system
disks or software from the parent VM. Full clones apply to common office automation
scenarios.

GPU See graphics processing unit


graphics processing A specialized electronic circuit designed to accelerate the building of three
unit dimensional and special-effect images. A GPU works for a video card as a CPU works
for a computer.
Guest OS See guest OS
guest OS An OS running on a VM.

hierarchical storage A storage mechanism that stores the most-frequently accessed IP SAN data on a solid-
state drive (SSD) to speed up access, stores the less-frequently accessed data on a
Serial Attached SCSI (SAS) drive, and stores the seldom accessed data on a Serial
Advanced Technology Attachment (SATA) drive.
Host A physical server that runs virtual software. VMs can be created on a host.
Hypervisor The software layer on a virtual server, which manages the VMs on the server and
helps VMs share the hardware resources of the virtual server. The Xen Hypervisor is a
software layer between the hardware and operating system, which performs CPU
scheduling and partitioning between VMs. The Xen Hypervisor controls VM
migration between hardware devices and other VM-related operations (because the
VMs share a processing environment). The Xen Hypervisor does not process
networks, storage devices, videos, or other I/O resources.

Image An exact copy of all running software on a server used for quick installation of the
VM operating system and software.
iNIC Intelligent Network Interface Card
Integrated Storage This centrally manages multiple storage systems.
Management
IP storage area A type of storage area network (SAN) that uses IP channels between servers and
network storage devices. IP SAN device performance is not as good as the FC SAN device
performance, but the use of IP SAN devices is not restricted by transmission distances.
With the IP bandwidth improvement, IP SAN devices will gradually replace FC SAN
devices.
IP SAN See IP storage area network
iSCSI Internet Small Computer Systems Interface
ISM See Integrated Storage Management

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 50


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

A.3 K-O
L

LB Load Balancer
linked clone A duplicate of a virtual machine that uses the same base disk as the original and a
chain of delta disks to keep track of the differences between the original and the clone.
This reduces the need for disk space and allows multiple VMs to use the same
software installation. Linked clones apply to scenarios that require VMs using the
same software installation, for example, call centers. System disks on linked clones
can have slight differences from the system disk on the parent VM. The differences
are stored on delta disks of the linked clones.
linked cloning A technology used to generate a quick copy of VMs by creating a delta disk instead of
copying an entire virtual hard disk.
linked snapshot A snapshot taken only for the memory or storage changes of a VM. A VM can be
restored using multiple relevant linked snapshots. A snapshot can be taken for the
memory or storage resource.
Live Migration Also known as hot migration, this is a method of migrating virtual machines (VMs)
without interrupting services.
local storage Storage space provided by a computing node agent (CNA).
logical cluster A logical group consisting of servers with the same attributes, such as CPU, storage,
and distributed virtual switch (DVS), in a physical cluster. The VM HA function takes
effect only for servers in the same logical cluster.
LUN Logical Unit Number

Management Module The management module of the server.


MM See Management Module

NAS See network attached storage


network attached A storage device that provides shared disk space on the network. It functions as file
storage sharing on a Windows system or the Network File System (NFS) on a Linux system.
Network Interface In the virtual system, this is identified as ethN, where N indicates a certain digit.
Card
Network Time An application-layer protocol which uses IP and UDP to synchronize the time
Protocol between the distributed time server and the client. NTP is evolved from Time Protocol
and ICMP Timestamp Message and features high protocol accuracy and good health.
NIC See Network Interface Card
NTP See Network Time Protocol

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 51


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

A.4 P-T
P

placeorder VM When the host-based replication disaster recovery (DR) is used, and you add VMs to a
protection group, UltraVR automatically creates placeorder VMs at the DR site based
on the VM specifications and resource mappings of the VMs added to the protection
group. Then UltraVR synchronizes data of the protected VMs with the placeorder
VMs. When executing the recovery plan, UltraVR can start the placeorder VMs at the
DR site to quickly restore services. UltraVR can also use a placeorder VM to clone
and start a VM to test the recovery plan. This process exerts no adverse impact on data
synchronization between the protected VM and the placeorder VM. After the recovery
plan is executed, UltraVR will stop and delete the clone.
POE See Provisioning Orchestration Engine
port group A group of ports with the same attributes on a distributed virtual switch (DVS) or
virtual software switch (VSS). In a hypervisor, all DVS settings, such as virtual local
area network (VLAN) and network flow control, are configured on a port group basis.
PortGroup See port group
Pre-boot Execution This technology enables computers to boot from the network. This technology is the
Environment successor of Remote Initial Program Load (RPL). The PXE works in client/server
mode. The PXE client resides in the ROM of a network card. When the computer
boots up, the BIOS invokes the PXE client to the memory. The PXE client obtains an
IP address from the DHCP server and downloads the operating system from the
remote server through TFTP.
Provisioning This exposes the unified service provisioning interface and synchronizes services
Orchestration Engine between components in the SingleCLOUD system.
PXE See Pre-boot Execution Environment

QoS See Quality of Service


Quality of Service A service that allows virtual storage device to migrate from one physical storage node
to another without interrupting the VM running. With the QoS enabled, users can
control the resources in a better way with costs reduced and a higher customer
satisfaction.

SAN See Storage Area Network


SC See Software Client
Site A group of servers at the same physical location.
Snapshot A reproduction of the memory or storage data on a VM created at a specific time
point. Snapshots can be used to restore VMs to a state when these snapshots were
taken.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 52


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

Software Client Software running on a common PC to process the virtual desktop protocol.
Storage Area Network A network dedicated to transporting data for storage and retrieval.
storage cold migration A storage migration mode that allows data migration on a disk only after all VMs on
the disk are stopped.
storage resource pool A collection of storage resources. For example, an IP storage area network (IP SAN)
functions as a storage resource pool for a cluster.
Storage Thin Storage thin provisioning is the act of using virtualization technology to give the
Provisioning appearance of more physical storage resources than is actually available. It allows
storage space to be easily allocated to users on an on-demand and auto-scale basis.
This optimizes utilization of available storage resources.

T
TC See Thin Client
Thin Client A terminal with lower processing power than a Thick Client that processes the virtual
desktop protocol, serves as the client of the remote desktop, and provides an access
method for users.
Thin LUN A logical storage unit created in the thin pool. The thin LUN is accessible to the host.
Thin Pool A thin pool is implemented based on storage thin provisioning. It allows storage space
to be dynamically allocated to users on demand. This optimizes utilization of available
storage resources.
Tools Tools is a virtualized driver for VMs. Tools improves VM performance, enables VM
hardware monitoring and advanced VM functions, such as migration, snapshot taking,
and on-line CPU adjustment.

A.5 U-Z
U
Unified Virtualization Virtual management software that divides the computing resource into multiple VM
Platform resources.
UVP See Unified Virtualization Platform

V
vCPU See Virtual CPU
VDS See Virtual Distributed Switch
vFW See Virtual Firewall
VIMS See Virtual Image Management System
Virtual CPU A hyper-thread on a server with multiple physical CPUs, which have multiple physical
cores on each CPU and multiple hyper-threads on each core.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 53


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

Virtual Disk A file in the host file system. For a customer operating system, it functions as a
physical disk drive. The file can be configured on the host or a remote file system.
After configuring a VM with a virtual disk, you can install a new operating system to
the disk file without having to repartition a physical disk or restart the host. Virtual
disks on the VMware Workstation can be mapped to the partitions on the host.
Virtual Distributed A virtual switch (created on a physical server) that uses software to implement data
Switch switching between VMs on the same or different servers.
Virtual Firewall A network firewall service or appliance running in a virtualized environment to
provide the usual packet filtering and monitoring functions like a physical network
firewall.
Virtual Image A high-performance cluster file system that enables the FusionManager to connect to
Management System storage resources through a unified interface, which allows multiple VMs to gain
access to an integrated storage pool to improve resource utilization efficiency. The
VIMS, as the basis for virtualizing multiple storage servers, provides services such as
live migration, dynamic resources scheduling, and high availability for storage
devices.
Virtual Local Area An end-to-end logical network across different network segments and networks,
Network constructed using the network management software based on the switching LAN.
Network resources and users are logically divided based on a certain principle and a
physical LAN is logically divided into multiple broadcasting domains (VLANs). The
hosts on a VLAN can directly communicate with each other whereas different VLANs
cannot. This efficiently suppresses broadcasting packets.
Virtual Machine One or multiple computer systems virtualized from a physical server.
Virtual Machine A function that controls the scheduling policy configuration and the control points of
Dispatch the policy dispatching.
Virtual Machine An operation that can be performed to a running VM. After the hibernated VM is
Hibernate started, it restores all programs before the hibernation.
Virtual Machine IP The IP address assigned to a VM, corresponding to the IP address of a physical
Address machine. The VM can communicate with other devices on the network through the IP
address.
Virtual Memory Virtualized memory for a VM allocated based on the physical memory. Even if the
memory is not physically contiguous, it is contiguous for the VM. The VM can
randomly save and obtain data in its virtual memory without affecting the memory
accessibility of other VMs on the same physical machine.
Virtual Network Card A network card for VMs that corresponds to that of a physical machine. Multiple
virtual network cards can be created for a single VM. The virtual network card can
connect to the physical network card in bridge mode for data transmission.
Virtual Resource Huawei-developed virtualization management software, which comprises Huawei
Management infrastructure products and the Unified Virtualization Platform (UVP).
Virtual Server This is where the operating system and applications run based on various
virtualization technologies, unlike the original physical server. When using certain
resources of the physical server, the virtual server is the same as the physical server
for users. Both partitions and VMs are considered virtual servers.

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 54


Copyright © Huawei Technologies Co., Ltd.
FusionCompute
Product Description A Glossary

Virtual Service A virtual appliance that provides layer 3 or layer 4 services on a virtual network. It can
Gateway contain one or multiple service instances including vRouter, vFirewall, vDHCP, NAT,
and VPN. The FusionManager supports VSG service implementation through a
vFirewall or a system VM.
Virtual Software This is deployed on a computing node and performs the virtual network switching
Switch function for the VMs on the node.
VLAN See Virtual Local Area Network
VM See Virtual Machine
VM High Availability With this, the O&M system continuously monitors all physical hosts and
automatically migrates all VMs off a faulty host.
VM Migration A technology used to migrate VMs to another hardware resource for VM operations.
VM Specifications A set of pre-defined VM attributes for creating VMs with unified specifications.
VM template A template used to create VMs that have the same specifications. A VM template is a
VM in essence. A VM and a VM template can convert to each other as required. After
a VM is converted to a VM template, only its isTemplate attribute is changed to true.
VMD See Virtual Machine Dispatch
VRM See Virtual Resource Management
VSG See Virtual Service Gateway
VSS See Virtual Software Switch

Issue 01 (2015-11-11) Huawei Proprietary and Confidential 55


Copyright © Huawei Technologies Co., Ltd.

Вам также может понравиться