Product Features

Licensing in ZStack Cloud is supplied in different functionality packages as Base and Plus. This topic describes features covered in the Enterprise Prepaid base license and add-on features provided in plus licenses.

For more information about the licensing details, see License Management. For differences about features provided in different editions, see Edition Comparison.

Features in Enterprise Prepaid

Type Features Description
Dashboard Custom Dashboard Displays multi-dimensional data statistics on cards and allows you to customize your own dashboard by adding and dragging cards.
Provides a default dashboard for users with different roles.
Monitor Displays Cloud resources in real time by using monitors with various themes.
Allows you to switch between KVM monitors and vCenter monitors as needed.
Allows you to switch between zones. You can view the information about resources in all zones or in a specific zone.
API Inspector Allows you to view the details of API requests that are called by using various methods, including POST, DELETE, PUT, GET, and GET-ZQL, after you perform operations on the UI.
VM Instance Bulk Action Allows you to manage VM instances in bulk.
Create VM Instance Allows you to create VM instances through different entries.
Allows you to specify the root volume capacity and batch attach data volumes via VM creation.
Import VM Instance Allows you to import a VM instance on a third-party platform by using the OVF template and customize the configurations of the VM instance.
Manage VM Instance Allows you to manage the lifecycle of VM instances, such as creating, importing, stopping, booting, rebooting, powering off, recovering, pausing, exporting, and deleting VM instances.
VM Console Allows you to access VM instances through terminals without using remote tools.
Supports three types of console mode: SPICE, VNC, and SPICE+VNC.
The SPICE protocol supports SSL encrypted channel to further ensure desktop security.
Allows you to set the console password, set the console password by force in the Global Setting, and configure the password strategy such as the password complexity and password length in the Global Setting.
Clone VM Instance Without Data Volumes Copies data in the root volumes only of a VM instance.
Allows you to clone VM instances in the running, paused, and stopped state for LocalStorage, NFS, SMP, Ceph, and SharedBlock primary storages.
Supports ImageStore and Ceph backup storages.
Clone VM Instance With Data Volumes Copies data both in the root volumes and data volumes of a VM instance.
Allows you to clone VM instances in the running, paused, and stopped state for LocalStorage, NFS, SMP, Ceph, and SharedBlock primary storages.
Supports ImageStore and Ceph backup storages.
Does not clone shared volumes (if any) with VM instances.
Custom Tag Allows you to customize tags for VM instances so that you can locate them quickly.
Change Host Allows you to migrate a VM instance from a host to another without changing the primary storage.
Supports hot migration and cold migration.
Hot migration: Migrates a VM instance in the running state. Hot migration applies to all of the primary storage types.
Allows you to hot migrate a VM instance with a vDPA NIC attached if the VM instance is on a LocalStorage or shared primary storage.
If the migration is blocked because the VM instance has high I/O operations for a long time, you can enable auto converge to ensure migration success.
Cold migration: Migrates a VM instance in the stopped state. Cold migration applies to LocalStorage primary storages only.
Allows you to cold migrate a VM instance with a vDPA NIC attached if the VM instance is on a LocalStorage primary storage.
Allows you to cold or hot migrate a VM instance based on the workloads of the destination host.
Change Primary Storage Allows you to migrate a VM instance from a primary storage to another without changing the host.
Supports hot migration and cold migration in only SharedBlock primary storages.
Hot migration: Migrates a VM instance in the running state.
Snapshots of the VM instance to be migrated will not be saved after the hot migration across SharedBlock primary storages.
Cold migration: Migrates a VM instance in the stopped state.
Allows you to hot or cold migrate a VM instance with all attached volumes (excluding shared volumes).
Change Host and Primary Storage Allows you to migrate a VM instance from a host and primary storage to another host and primary storage.
Supports hot migration and cold migration.
Hot migration: Migrates a VM instance in the running state.
Supports hot migration across primary storages of the same type, including Ceph↔Ceph, NFS↔NFS, and SharedBlock↔SharedBlock.
Snapshots of the VM instances to be migrated will not be saved after the hot migration across primary storages of the same type.
If you hot migrate a VM instance across Ceph primary storages, you can specify a root volume pool or data volume pool for the volumes to be migrated.
Allows you to hot migrate a VM instance across primary storages of different types, including Ceph↔SharedBlock, LocalStorage↔SharedBlock, LocalStorage↔Ceph, LocalStorage↔NFS, SharedBlock↔NFS, and Ceph↔NFS.
Snapshots of the VM instances to be migrated will not be saved after the hot migration across primary storages of different types.
If you hot migrate a VM instance from a SharedBlock, Localstorage, or an NFS primary storage to a Ceph primary storage, you can specify a root volume pool or data volume pool for the volumes to be migrated.
Supports hot migration across Ceph pools within the same Ceph primary storage and allows you to migrate only root volume or migrage data volumes with VM instances.
Cold migration: Migrates a VM instance in the stopped state.
Allows you to cold migrate a VM instance across primary storages of the same type, including Ceph↔Ceph and NFS↔NFS.
Allows you to cold migrate a VM instance across primary storages of the same type without data volumes.
If you cold migrate a VM instance across Ceph primary storages, you can specify a root volume pool for the volumes to be migrated.
Supports cold migration (with data volumes) across Ceph pools within the same Ceph primary storage.
Allows you to clean up raw data after migration to release more space after you confirm the data integrity.
Modify Instance Offering Allows you to modify the instance offering (CPU and memory) of a VM instance that is in the running or stopped state.
Set GPU Specification Allows you to set the GPU specification for a VM instance that is in the stopped state. You can attach, modify, and detach a physical GPU specification or virtual GPU specification as needed.
Resize Root Volume Allows you to expand the root volume of a VM instance that is in the running or stopped state. The new size takes effect immediately.
Resize Data Volume Allows you to expand the data volume of a VM instance that is in the running or stopped state. The new size takes effect immediately.
Change Owner Allows you to change the owner of a VM instance that is in the running or stopped state.
Change System Allows you to change the operating system of a VM instance that is in the stopped state.
Reimage VM Instance Allows you to restore a VM instance to the initial state of the VM image. All the data in the root volume will be overwritten.
Set Boot Order Allows you to set the boot order for a VM instance.
Supports three boot types: boot from hard disk, boot from CD ROM, and boot from network.
Boot from Host Allows you to specify a host on which a VM instance boots.
VM High Availability Allows you to set VM high availability so that the VM instance can reboot automatically in case of host exception. You can view the reboot progress on the UI.
Time Synchronization Allows you to set whether the base time of a VM instance is the same as that of the host.
SSH Key Injection Allows you to inject an SSH key for VM instances with the Linux or BSD operating system.
Allows you to create or delete an SSH key.
Disables VyOS SSH authentication login by default to enhance security.
Change VM Password Allows you to change the password of a Windows or Linux VM instance that is in the running state.
Set Hostname Allows you to set the hostname when you create a VM instance.
Resource Priority Allows you to set resource priority (Normal and High). When resource contention occurs, VM instances with High resource priority can compete for more resources than those with Normal resource priority.
Cross-Cluster High Availability Allows you to set the cross-cluster high availability policy for a VM instance. If the policy is enabled, the VM instance can be automatically migrated across clusters. If disabled, the VM instance can only operate in the cluster where the VM instance resides when this policy takes effect.
Currently, this policy applies to host migration scenarios such as starting up a VM instance on another host to achieve HA or migrating a VM instance to another host if the source host enters the maintenance mode.
This policy takes effect only for VM auto-migrations. Other actions, such as manual hot migration, VM startups on specified hosts, and Dynamic Resource Scheduling (DRS) policy-based migrations are not affected.
USB Redirection Allows you to redirect a USB device from a VDI client to a VDI VM instance.
VM Snapshot Allows you to schedule snapshot creation at specified time points to record the state of the root volume, data volume, or memory of an instance before you perform a business-sensitive operation. This allows rollback in case of breakdowns.
Supports two snapshot types: single snapshot and snapshot group. The snapshot group type allows you to restore a group of VM instances in bulk.
Allows you to create snapshots for VM instances that are in the running state. Supported backup storages: ImageStore or Ceph backup storage.
Allows you to create snapshots for VM instances that are in the stopped state. Supported backup storages: ImageStore or Ceph backup storage.
Supports VM auto boot after restoring from snapshots.
Allows you to delete VM snapshots in bulk.
Allows you to create a VM instance from a single snapshot or create a VM instance with data volumes from a snapshot group.
VM Backup Allows you to create a backup for a VM instance that is in the running state.
Allows you to create either an incremental backup or a full backup for a VM instance.
Allows you to create a backup for a VM instance with its volumes (excluding shared volumes) when the VM instance is in the running state.
This feature is provided by the Backup Service module.
VM Image Allows you to create a template image based on a VM instance so that you can create VM instances in bulk in a custom way.
Allows you create a VM image when the VM instance is in the running state. Supported backup storages: ImageStore and Ceph.
Allows you create a VM image when the VM instance is in the stopped state. Supported backup storages: ImageStore and Ceph.
ISO-based Deployment Creates VM instances based on an ISO disk and guides the system installation.
Supports multiple ISOs per VM instance, improving the business deployment efficiency.
Template-based Deployment Creates VM instances based on a system template.
Associate/Disassociate Affinity Group Allows you to associate/disassociate an affinity group with/from a VM instance that is in the running or stopped state.
Attach/Detach Volume Allows you to attach/detach a data volume to/from a VM instance that is in the running or stopped state. Allows you to optimize drive models and identify a volume by its SCSI WWN.
Shared Volume Allows VM instances in Ceph or SharedBlock primary storages to share the same data volume.
Create Volume Image Allows you to create an image for root volumes or data volumes attached to a VM instance when the VM instance is in the running or stopped state.
Before you can create an image for shared volumes on a SharedBlock primary storage, stop all the VM instances attached by the shared volume first.
Set Volume QoS Allows you to set QoS for root volumes and data volumes attached by a VM instance when the VM instance is in the running or stopped state.
Attach/Detach NIC Allows you to attach/detach a NIC to/from a VM instance that is in the running or stopped state. You can set a default NIC.
Set NIC Type Allows you to set the NIC type when the VM instance is in the stopped state.
Allows you to change the NIC type from a VF NIC to a vNIC only.
Set NIC Model Allows you to set the NIC model for a VM instance that is in the running or stopped state. supported VM NIC models: virtio, rtl8139, and e1000.
This operation applies to Linux and Paravirtualization operating systems only.
Change L3 Network for VM NIC Allows you to change the L3 network for a VM NIC without affecting the hardware information such as the MAC address and PCI address of the NIC.
Set Network QoS Allows you to set the network QoS for a VM instance that is in the running or stopped state.
Customize MAC Address Allows you to customize a MAC address when you create a VM instance.
Allows you to change the MAC address when the VM instance is in the stopped state.
Customize IP Address Allows you to customize an IP address when you create a VM instance.
Allows you to change the IP address when the VM instance is in the stopped or running state.
Attach/Detach EIP Allows you to attach an EIP to or detach an EIP from a VM NIC.
VM Multi-Gateway Allows you to enable multi-gateway by running zstack-clt. After enabled, each VM NIC has an independent gateway.
Create/Delete vDrive Allows you to create/delete a vDrive for a VM instance that is in the stopped state. You can attach/detach an ISO to/from a drive.
Attach/Detach Peripheral Device Allows you to attach/detach a LUN to/from a VM instance that is in the running or stopped state.
Allows you to attach/detach a physical GPU device to/from a VM instance that is in the running or stopped state.
Allows you to attach/detach a virtual GPU device to/from a VM instance that is in the running or stopped state.
Allows you to attach/detach a USB device to/from a VM instance that is in the running or stopped state.
Allows you to attach/detach other peripheral devices, such as Moxa cards, to/from a VM instance that is in the running or stopped state.
CPU Model

Allows you to set the CPU model for a VM instance through three entries: Global Setting, Cluster Setting, and VM Setting. The setting takes effect with the following priority: Global Setting < Cluster Setting < VM Setting.

CPU Pinning Assigns the virtual CPUs (vCPUs) of a VM instance to specific host pCPUs, which improves VM performance.
vNUMA Configuration Allows you to configure vNUMA for a VM instance to generate a topology of virtual NUMA nodes for the VM instance. This topology enables a vCPU on a vNUMA node to primarily access the local memory and thus improves VM performance.
EmulatorPin Configuration Allows you to configure EmulatorPin for a VM instance so that all other threads than virtual CPU (vCPU) threads and IO threads of a VM instance are assigned to physical CPUs (pCPUs) of the host.
VM Performance Optimization Allows you to install performance optimization tools (GuestTools) for Linux VM instances for agent installation and internal monitoring.
Allows you to install performance optimization tools (GuestTools) for Windows and Windows Virtio VM instances for agent installation and internal monitoring. You can install the Virtio driver with one click to improve the disk and NIC performances.
Import User Data Allows you to import user data when you create a VM instance. You can upload user-defined parameters or scripts to customize configurations for VM instances or to accomplish specific tasks.
BIOS Mode Inherits the BIOS mode from the image you selected when you create a VM instance. The BIOS mode include Legacy and UEFI.
Inherits the BIOS mode of the original VM instance when you create a VM image or clone a VM instance.
Allows you to change the BIOS mode when the VM instance is in the running or stopped state.
VM QGA Flexibly controls and manages the state of the QEMU guest agent. After QGA is enabled, you can change the VM password when the VM instance is in the running state.
VM RDP After RDP is enabled, you can launch the VM console in RDP mode by default in VDI scenarios.
Anti-Spoofing Mode Provides IP/MAC anti-spoofing and ARP anti-spoofing. If enabled, VM instances can only communicate with outside networks using the IP/MAC addresses allocated by the Cloud.
VM Monitoring External monitoring: Collects the VM data such as CPU, memory, disk I/O, NIC data from hosts by using libvirt.
Internal monitoring: Collects the VM data such as CPU, memory, and disk size data from VM instances by using an agent. An agent is required for internal monitoring.
Advanced Settings Allows you to enable NUMA for a single VM instance so that you can modify the instance offering (CPU and memory) for the VM instance.
Allows you to enable Hyper-V for a Windows VM instance only.
Allows you to set the number of queues when VirtIO NIC traffics are allocated to multiple CPUs, which improves the NIC performance.
Audit Audits all of the actions performed on VM instances, which effectively ensures the security of the cloud environment.
Custom Column Allows you to customize the items to be displayed on a VM list.
Export CSV File Allows you to export the VM information as a CSV table, which helps in statistical analysis and problem diagnosis.
Resource Deletion Policy Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), and Never.
Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed.
Volume Bulk Action Allows you to manage volumes in bulk.
Create Volume Provides multiple strategies to create volumes.
Manage Volume Allows you to manage the lifecycle of volumes, such as creating, enabling, disabling, and deleting volumes.
Attach/Detach Instance Allows you to attach/detach a volume to/from an instance.
Change Host Allows you to migrate a volume to another host. This action applies to local primary storages only.
Allows you to migrate a volume based on the workloads of the destination host.
Change Primary Storage Allows you migrate a volume to another primary storage.
Supports volume migration across primary storages of the same type, including Ceph↔Ceph, NFS↔NFS, and SharedBlock↔SharedBlock.
Allows you to migrate volumes not attached to any instances between Ceph↔Ceph, NFS↔NFS, and SharedBlock↔SharedBlock.
Allows you to migrate volumes attached a VM instance in the stopped state across SharedBlock primary storages.
Supports volume migration across Ceph pools within the same Ceph primary storage.
Allows you to clean up raw data after migration to release more space after you confirm the data integrity.
Change Owner Allows you to change the owner of a volume.
Resize Volume Allows you to expand a volume that is not attached to any instance.
Allows you to expand the volume of an instance that is in the running or stopped state.
In Ceph primary storages, allows you to expand a shared volume that is not attached to any instance or is attached to an instance that is in the stopped state.
Custom Tag Allows you to customize tags for volumes so that you can locate them quickly.
Volume Backup Allows you to create a backup for a volume that is attached to an instance in the running state.
Allows you to create either an incremental backup or a full backup for a volume.
This feature is provided by the Backup Service module.
Volume Image Allows you to create a template image based on a volume can create volumes in bulk in a custom way.
Allows you to create an image for a volume that is not attached to any instance.
Allows you to create an image for a volume that is attached to an instance in the running or stopped state.
In SharedBlock primary storages, allows you to create an image for a shared volume that is not attached to any instance or is attached to an instance that is in the stopped state.
In Ceph primary storages, allows you to create an image for a shared volume that is not attached to any instance or is attached to an instance that is in the running/stopped state.
Volume Snapshot Allows you to schedule snapshot creation at specified time points to record the state of a root volume or data volume before you perform a business-sensitive operation. This allows rollback in case of breakdowns
Allows you to restore a volume snapshot as needed.
Allows you to delete volume snapshots in bulk.
Set Volume QoS Allows you to set QoS for volumes.
Shared Volume Allows you to create shared volumes in Ceph or SharedBlock primary storages.
Audit Audits all of the actions performed on volumes, which effectively ensures the security of the cloud environment.
Export CSV File Allows you to export the volume information as a CSV table, which helps in statistical analysis and problem diagnosis.
Resource Deletion Policy Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), and Never.
Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed.
Image Bulk Action Allows you to manage images in bulk.
Add Image Allows you to add two types of images: system image (ISO/Image) and volume image (Image).
Allows you to set the CPU architecture of an image, including x86_64, aarch64, and mips64el. Creating VM instances, creating VM images, and cloning VM instances will inherit the CPU architecture of the original image.
Allows you to set the image platform, such as Linux,Windows, and Other.
Allows you to upload an image by using an URL or local browser.
Allows you to set the BIOS mode for an image, including Legacy and UEFI. Creating VM instances, creating VM images, and cloning VM instances will inherit the BIOS mode of the original image.
Manage Image Allows you to manage the lifecycle of images, such as adding, enabling, disabling, and deleting images.
Change Backup Storage Allows you to migrate an image to another backup storage. This action applies to Ceph backup storages only.
Allows you to clean up raw data after migration to release more space after you confirm the data integrity.
Export Image Allows you to export an image from an ImageStore or Ceph backup storage.
Provides the MD5 value of the downloaded image to check the image integrity.
Sync Image Allows you to synchronize images among different ImageStore backup storages in the same management node.
Set Sharing Mode Allows you to set the sharing mode of an image, including share globally, share to specified projects or accounts, and not share.
Audit Audits all of the actions performed on images, which effectively ensures the security of the cloud environment.
Resource Deletion Policy Provides three deletion policies to lower risks caused by misoperations. The policies include Direct, Delay (default), and Never.
Displays warnings of the consequences on the UI and asks for confirmation before the deletion is completed.
Instance Offering Bulk Action Allows you to manage instance offerings in bulk.
Create Instance Offering Allows you to select a host allocation policy, including host with minimum number of running VMs (default policy), host with minimum CPU utilization, host with minimum memory utilization, host with maximum number of running VMs, host where the VM is located last time, and random host allocation to create VM instances.
When the host allocation strategy is host with minimum CPU utilization or host with minimum memory utilization, you can select the mandatory strategy mode or non-mandatory strategy mode (default mode).
If the Cloud can obtain the host load information, it will create VM instances according to the host allocation strategy. If the Cloud could not obtain the host load information, it will create VM instances according to the strategy mode.
Allows you to set disk QoS and network QoS for an instance offering.
Allows you to set advanced parameters through JSON to customize an instance offering.
Manage Instance Offering Allows you to manage the lifecycle of images, such as creating, enabling, disabling, and deleting instance offerings.
Set Sharing Mode Allows you to set the sharing mode of an instance offering, including share globally, share to specified projects or accounts, and not share.
Audit Audits all of the actions performed on instance offerings, which effectively ensures the security of the cloud environment.
Disk Offering Bulk Action Allows you to manage disk offerings in bulk.
Create Disk Offering Allows you to set the disk QoS for a disk offering.
Allows you to set advanced parameters through JSON to customize a disk offering.
Manage Disk Offering Allows you to manage the lifecycle of disk offerings, such as creating, enabling, disabling, and deleting disk offerings.
Set Sharing Mode Allows you to set the sharing mode of a disk offering, including share globally, share to specified projects or accounts, and not share.
Audit Audits all of the actions performed on disk offerings, which effectively ensures the security of the cloud environment.
GPU Specification Bulk Action Allows you to manage physical GPU specifications in bulk. vGPU specifications do not support bulk actions.
Manage Physical GPU Specification Automatically detects available physical GPU specifications on the Cloud and lists them in the UI.
Allows you to enable or disable a physical GPU specification.
Manage Virtual GPU Specification Generates virtual GPU specifications from the detected physical GPU specifications and lists them in the UI.
Allows you to enable or disable a virtual GPU specification.
Set ROM Allows you to set ROM for physical GPU specifications for physical GPU passthrough.
Set Sharing Mode Allows you to set the sharing mode of a GPU specification, including share globally, share to specified projects or accounts, and not share.
Audit Audits all of the actions performed on GPU specifications, which effectively ensures the security of the cloud environment.
Auto-Scaling Group Create Auto-Scaling Group Allows you to set a health check mechanism, including load balancer health check and VM health check to trigger elastic self-healing.
Allows you to set the resource monitoring and alarm mechanism to trigger elastic scaling. The mechanism includes trigger metrics, scale-out policy, scale-in policy, and whether to enable alarm notification (if enabled, an endpoint is required). The trigger metrics include both external monitoring items (VM Memory Utilization Average, VM CPU Utilization Average) and internal monitoring items (VM Memory Utilization Average, VM CPU Utilization Average) of VM instances. Note that an agent is required for internal monitoring.
Allows you to set a periodic policy (scale-out policy or scale-in policy) for an auto-scaling group. The scale-out/scale-in cycle can be accurate to minutes with a minimum cycle interval of 15 minutes.
Manage Auto-Scaling Group Allows you to manage the lifecycle of auto-scaling groups, such as creating, enabling, disabling, and deleting auto-scaling groups.
Associate/Disassociate Affinity Group Allows you to associate/disassociate an auto-scaling group with/from an affinity group, so as to manage the allocation strategy of VM instances on hosts and ensure high service performance and high availability.
Currently, only soft anti-affinity groups can be associated.
Change Image Allows you to change the image of VM instances in an affinity group.
Changing image takes effect only on VM instances that are newly created or added to the group. Images of existing VM instance do not change.
Scaling Records Allows you to view the scaling activities in an auto-scaling group.
Audit Audits all of the actions performed on auto-scaling groups, which effectively ensures the security of the cloud environment.
Snapshot Manage Snapshot Displays instances and snapshots on the snapshot management page with instances on the left and snapshots on the right. You can view the relationship between instances and snapshots dynamically.
The instance panel on the left allows you to sort instances according to their snapshot count or snapshot size.
The snapshot panel on the right allows you to view the snapshots by list or by topology.
Allows you to manage the lifecycle of snapshots, such as creating and deleting snapshots.
Create Snapshot Allows you to schedule snapshot creation at specified time points to record the state of an instance before you perform a business-sensitive operation. This allows rollback in case of breakdowns.
Create Instance Allows you to create an instance from an instance snapshot.
Revert Snapshot Allows you to restore an instance from an instance snapshot.
Audit Audits all of the actions performed on snapshots, which effectively ensures the security of the cloud environment.
Affinity Group Create Affinity Group Allows you to create two types of affinity groups: anti-affinity (soft) and anti-affinity (hard).
Manage Affinity Group Allows you to manage the lifecycle of affinity groups, such as creating, enabling, disabling, and deleting affinity groups.
Associate/Disassociate VM Instance Allows you to associate/disassociate a VM instance with/from an affinity group.
Audit Audits all of the actions performed on affinity groups, which effectively ensures the security of the cloud environment.
Zone Create Zone In a data center, a zone corresponds to an equipment room. You can create one or more zones as needed, and create clusters/network resources and primary storages to each zone.
Manage Zone Allows you to manage the lifecycle of zones, such as creating, enabling, disabling, and deleting zones.
Manage Associated Resources Allows you to manage the clusters, baremetal clusters/elastic baremetal clusters (licenses are required), primary storages, backup storages, L2 networks and other resources in a zone.
Audit Audits all of the actions performed on zones, which effectively ensures the security of the cloud environment.
Cluster Create Cluster Allows you to define cluster attributes (KVM and XDragon) based on the hypervisor type of hosts. Hosts in a KVM cluster use the KVM virtualization technology, and hosts in a XDragon cluster use the X-Dragon architecture.
Allows you to define cluster attributes based on the host CPU architecture, including x86_64, aarch64, and mips64el.
Allows you to specif a VDI network and migration network for a cluster.
Allows you to set the VM CPU model and host CPU model in a cluster as needed.
Manage Cluster Allows you to manage the lifecycle of clusters, such as creating, enabling, disabling, and deleting clusters.
Manage Associated Resources Allows you to manage the VM instances, hosts, primary storages, iSCSI storages, L2 networks, peripheral devices, and other resources in a cluster.
Advanced Settings Allows you to set the CPU overcommit, memory overcommit, and host reserved memory for all VM instances in a cluster.
Allows you to enable vNIC multi-queue upgrading for all VM instances in a cluster to improve the VM performance.
Allows you to enable multi-queue driver support for all VM NICs in a cluster to allocate Virtio NIC traffic to multiple CPUs.
Allows you to enable huge page for all hosts in a cluster, which effectively reduce the CPU performance loss of VM instances.
Allows you to enable Hyper-V simulation for all Windows VM instances in a cluster.
Allows you to set the default graphics card type at the VM startup for all VM instances in a cluster.
Allows you to enable KVM virtualization flag for all VM instances in a cluster.
Allows you to enable Dynamic Resource Scheduling (RDS) for clusters. This feature monitors the CPU or memory load of hosts on a cluster basis, and provides scheduling suggestions based on the configured scheduling strategy, which improves the O&M efficiencies. (This feature is provided in technical preview.)
Allows you to enable Zero Copy for all hosts in a cluster. Enabling this feature will reduce the number of data copies between user space and kernel space, lower CPU usage, and improve vNIC performance.
Audit Audits all of the actions performed on clusters, which effectively ensures the security of the cloud environment.
Host Bulk Action Allows you to manage hosts in bulk.
Add Host Allows you to add hosts manually or by importing a template. You can add up to 500 hosts at a time.
Supports two hypervisor type: KVM and XDragon. KVM hosts use the KVM virtualization technology and XDragon hosts use the X-Dragon architecture.
Manage Host Allows you to manage the lifecycle of hosts, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting hosts.
Custom Tag Allows you to customize tags for hosts so that you can locate them quickly.
Change Host Password Allows you to change the password of a host. The new password takes effect after the host automatically reconnects.
Host Login Password Encrypted Storage Allows you to encrypt the login password of hosts in the database to protect your data security.
Manage Associated Resources Allows you to manage the VM instances, VPC vRouters, and other virtual resources on a host.
After you deploy SAN storages (iSCSI storage and FC storage) on a hos, you can manage the LUNs on the host and pass through them to VM instances.
Allows you to manage the physical NICs detected on a host, generate VF NICs from these physical ones through SR-IOV, and pass through the VF NICs to VM instances. These VF NICs inherit the high performance of those physical ones.
Allows you to manage the physical GPU devices detected on a host and pass through them with other peripheral devices (such as GPU graphics card and GPU sound cards) to VM instances.
Allows you to generate virtual GPU devices from physical GPU devices (NVIDIA/AMD graphics cards) and attach these virtual GPU devices to VM instances.
Allows you to manage the USB devices detected on a host and pass through them to VM instances.
Allows you to manage the PCI devices detected on a host, edit the PCI allowlist, and pass through these PCI devices to VM instances. The PCI devices include Ali-NPU cards, IB cards in PCI mode, and FPGA cards.
Intel EPT Hardware Assist Allows you to enable Intel EPT hardware assist for Intel CPUs to improve the CPU performance.
Host Monitoring Monitors and displays host metrics such as CPU, memory, disk read and write, disk size, and NIC throughput.
Audit Audits all of the actions performed on hosts, which effectively ensures the security of the cloud environment.
Export CSV File Allows you to export the host information as a CSV table, which helps in statistical analysis and problem diagnosis.
Primary Storage Local Storage Allows you to use the local disk directory of your host as a primary storage.
Supported backup storage: ImageStore.
Allows you to manage the lifecycle of local primary storages, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting local primary storages.
Allows you to manage VM instances, volumes, clusters, hosts, and other resources on a local primary storage.
Monitors and displays the percentage of used capacity of local primary storages.
NFS Supports NFS protocols. All hosts can automatically mount the same NFS shared directory as the primary storage.
Supported backup storage: ImageStore.
Allows you to specify a storage network for NFS primary storages. The storage network is used to check the health status of VM instances.
Allows you to manage the lifecycle of NFS primary storages, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting NFS primary storages.
Allows you to manage VM instances, volumes, clusters, and other resources on a NFS primary storage.
Allows you to clean up the raw data preserved after migration across NFS primary storages.
Monitors and displays the percentage of used capacity of NFS primary storages.
SharedMountPoint Supports network shared storages provided by commonly used distributed file systems, such as MooseFS, GlusterFS, OCFS2, and GFS2.
Supported backup storage: ImageStore.
Allows you to specify a storage network for SharedMountPoint primary storages. The storage network is used to check the health status of VM instances.
Allows you to manage the lifecycle of SharedMountPoint primary storages, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting SharedMountPoint primary storages.
Allows you to manage VM instances, volumes, clusters, and other resources on a SharedMountPoint primary storage.
Monitors and displays the percentage of used capacity of SharedMountPoint primary storages.
Ceph Supports Ceph distributed block storage. Supported editions: Ceph open source edition (J/L/N) and Ceph enterprise edition.
If you add Ceph enterprise to the Cloud, you can enjoy the license validity reminder
Supported backup storage: ImageStore. and Ceph
Allows you to specify Ceph pools such as root volume pool, data volume pool, and image cache pool when you add a Ceph primary storage. You can manage all the Ceph pool centrally, add more Ceph pools to expand the capacity, customize the display name of Ceph pool, and specify Ceph pools when you create VM instances, clone VM instances, and create volumes.
Allows you to specify a storage network for Ceph primary storages. The storage network is used to check the health status of VM instances.
Allows you to add multiple Ceph monitors and manage all the monitors centrally.
Allows you to manage the lifecycle of Ceph primary storages, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Ceph primary storages.
Allows you to manage VM instances, volumes, clusters, and other resources on a Ceph primary storage.
Allows you to clean up the original data preserved after migration across Ceph primary storages.
Monitors and displays the percentage of used capacity of Ceph primary.
SharedBlock Allows you to use a block device divided from a SAN storage as a storage pool. SharedBlock primary storages support iSCSI and FC shared access protocols.
Supported backup storage: ImageStore.
Allows you to specify a provisioning method (thick provisioning or thin provisioning) when you add a SharedBlock primary storage. You can also specify the provisioning method when you create VM instances, clone VM instances, or create volumes by using a SharedBlock primary storage.
Allows you to specify a storage network for SharedBlock primary storages. The storage network is used to check the health status of VM instances.
Allows you to add multiple shared blocks and refresh the storage capacity to view its changes when you expand or replace a block device.
Allows you to forcibly clean up the data in a block device, such as the signature in the file system, RAID, and partition table.
Allows you to manage the lifecycle of SharedBlock primary storages, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting SharedBlock primary storages.
Allows you to manage VM instances, volumes, clusters, LUNs, and other resources on a SharedBlock primary storage.
Allows you to clean up the original data preserved after migration across SharedBlock primary storages.
Monitors and displays the percentage of used capacity of SharedBlock primary storages.
Support Multiple Primary Storages Per Cluster Supports more than one local primary storage per cluster.
Supports more than one NFS primary storage per cluster.
Supports more than one SharedBlock primary storage per cluster.
Supports one local primary storage and one NFS/SharedMountPoint/SharedBlock primary storage per cluster.
Supports one Ceph primary storage and multiple SharedBlock primary storages per cluster.
Supports one Ceph primary storage and up to 3 LocalStorage primary storages per cluster.
Advanced Settings Allows you to set the space preallocation policy for volumes on local, NFS, SharedMountPoint, and SharedBlock primary storages.
Allows you to set the storage preallocation policy for SharedBlock primary storages.
Allows you to set storage overcommit for all types of primary storages.
Audit Audits all of the actions performed on primary storages, which effectively ensures the security of the cloud environment.
Backup Storage ImageStore Stores image files as image slices and supports incremental storage.
Supported primary storage: Local Storage, NFS, SharedMountPoint, Ceph, and SharedBlock.
Allows you to obtain the existing image files under the mount path of the ImageStore backup storage.
Allows you to specify a data network for an ImageStore backup storage for data communication with compute nodes.
Supports image synchronization between different ImageStore backup storages on the same management node, and allows you to specify an image synchronization network for ImageStore backup storages.
Allows you to manage the lifecycle of ImageStore backup storages, such as adding, enabling, disabling, reconnecting, and deleting ImageStore backup storages.
Allows you to clean up invalid data stored in ImageStore backup stores to releases storage space.
Allows you to change the password for an ImageStore backup storage.
Allows you to centrally manage images in an ImageStore backup storage.
Monitors and displays the percentage of used capacity of ImageStore primary storages.
Ceph Stores image files as Ceph distributed blocks.
Supported primary storage: Ceph.
Allows you to add multiple Ceph monitors and manage all the monitors centrally.
Allows you to specify Ceph pools when you add a Ceph backup storage.
Allows you to specify a data network for a Ceph backup storage for data communication with compute nodes.
Allows you to manage the lifecycle of Ceph backup storages, such as adding, enabling, disabling, reconnecting, putting into maintenance mode, and deleting Ceph backup storages.
Allows you to centrally manage images in a Ceph backup storage.
Allows you to clean up the original data preserved after migration across Ceph backup storages.
Monitors and displays the percentage of used capacity of Ceph backup storages.
Audit Audits all of the actions performed on backup storages, which effectively ensures the security of the cloud environment.
SAN Storage iSCSI Allows you to add an iSCSI server and directly log in to iSCSI storage after you add the server successfully.
Synchronizes data on iSCSI storages and displays all block devices on iSCSI storages in real time.
Allows you to add a block device divided from an iSCSI storage as a SharedBlock primary storage and pass through it to VM instances.
Allows you to manage the lifecycle of iSCSI storages, such as enabling, disabling, and deleting iSCSI storages.
Allows you to attach/detach an iSCSI storage to/from a cluster.
FC Synchronizes device information after you deployed an FC storage and displays the FC storage and its block devices in real time.
Allows you to add a block device divided from an FC storage as a SharedBlock primary storage and pass through it to VM instances.
Synchronizes information about a single block device on an FC storage.
Allows you to check the status of the cluster where block devices are located.
Network Resource L2 Network Supports the following types of L2 networks: L2NoVlanNetwork, L2VlanNetwork, VxlanNetwork, and HardwareVxlanNetwork.
VLAN (802 1Q) supports a maximum of 4094 logical networks, and VXLAN supports a maximum of 16 million logical networks.
VxlanNetwork is a software VXLAN-based solution that effectively addresses the shortage of logical network segments in the cloud data center and MAC flooding in upper layer switchs.
HardwareVxlanNetwork is a solution for working with third-party hardware SDN. By adding an SDN controller, you can take over the SDN network of hardware switches on the Cloud, therefore reducing network latency and improving VXLAN network performance.
Supports two types of virtual switches (vSwitch): Linux Bridge and OVS-DPDK. Linux Bridge vSwitches are applicable to all types of L2 networks and support SR-IOV. OVS-DPDK vSwitches are applicable only to L2VlanNetwork and L2NoVlanNetwork L2 networks and do not support SR-IOV.
Allows you to manage the lifecycle of L2 networks, such as creating and deleting L2 networks.
Allows you to centrally manage L3 networks and clusters on an L2 network.
VXLAN Pool Supports software SDN VXLAN pool and hardware SDN VXLAN pools. A software SDN VXLAN pool is a collection of VxlanNetwork L2 networks, and a hardware SDN VXLAN pool is a collection of HardwareVxlanNetwork L2 networks.
Allows you to manage the lifecycle of VXLAN pools, such as creating and deleting VXLAN pools.
Allows you to manage VNI ranges in a VXLAN pool and customize the name of the VNI ranges.
Allows you to centrally manage the VTEP, clusters, and VXLAN networks in a VXLAN pool.
Public Network A public network is an L3 network that has direct access to the Internet.
Allows you to manage the lifecycle of public networks, such as creating and deleting public networks.
Allows you to add IP ranges of IPv4 and IPv6 types.
IPv4 public networks allow you to add either an IP range or an address pool. An address pool can be used to create virtual IP addresses only.
Allows you to customize the MTU of a public network to limit the size of network transmission packets.
Monitors and displays the IP usage statistics of public networks, which helps to improve IP planning efficiency.
Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a public network.
Flat Network A flat network is an L3 network connected to the network where the host is located and has direct access to the Internet.
VM instances in flat network networks can use IP resources of an actual network.
Allows you to manage the lifecycle of flat networks, such as creating and deleting flat networks.
Allows you to add IP ranges of IPv4 and IPv6 types.
IPv4 flat networks support the following network services: DHCP, User Data, elastic IP, security group, and port mirroring.
IPv6 flat networks support the following network services: DHCP, DNS, elastic IP, and security group.
Allows you to customize the MTU of a flat network to limit the size of network transmission packets.
Monitors and displays the IP usage statistics of flat networks, which helps to improve IP planning efficiency.
Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a flat network.
VPC Network A VPC network is a L3 private network where VM instances can be created. A VM instance in a VPC network can access the Internet through a VPC vRouter.
Allows you to manage the lifecycle of VPC networks, such as creating and deleting VPC networks.
Allows you to add IP ranges of IPv4 and IPv6 types.
IPv4 VPC networks support the following network services: DHCP, User Data, DNS, SNAT, route table, elastic IP, port forwarding, load balancing, IPsec tunnel, security group, dynamic routing, multicast routing, VPC firewall, port mirroring, and netflow.
IPv6 VPC networks support the following network services: DHCP, DNS, and security group.
Allows you to attach/detach a VPC vRouter to/from a VPC network.
Allows you to customize the MTU of a VPC network to limit the size of network transmission packets.
Monitors and displays the IP usage statistics of VPC networks, which helps to improve IP planning efficiency.
Allows you to centrally manage the IP ranges (IPv4/IPv6) and DNS resources on a VPC network.
VPC vRouter A VPC vRouter is a dedicated VM instance that provides multiple network services.
Allows you to specify a host on which a VPC vRouter starts.
Allows you to specify a primary storage when you create a VPC vRouter.
Allows you to specify a default IPv4 address or IPv6 address for a VPC vRouter.
Allows you to set a DNS (IPv4/IPv6) on a VPC vRouter and centrally manage all the DNS on the VPC vRouter.
Allows you to associate the virtual CPUs (vCPUs) of a VPC vRouter with host pCPUs stringently and allocate specific pCPUs for the VPC vRouter, thus improving VPC vRouter performances.
Allows you to manage the lifecycle of VPC vRouters, such as creating, starting, stopping, restarting, and deleting VPC vRouters.
Allows you to migrate a VPC vRouter to another host without changing the primary storage. This action is supported only by VPC vRouters in the running state. We recommend that you perform this action during off-peak hours.
Allows you to migrate a VPC vRouter to another primary storage and host. You can hot migrate a VPC vRouter across primary storages of different types, including LocalStorage↔SharedBlock, LocalStorage↔NFS, and SharedBlock↔NFS.
Allows you to access a VPC vRouter by using a terminal. You can also set the console password for a VPC vRouter.
Supports auto migration across clusters. Applicable scenarios: start up a VPC vRouter on another host to achieve HA or migrate a VPC vRouter to another host if the source host enters the maintenance mode.
Allows you to set the CPU model for a VPC vRouter through three entries: Global Setting, Cluster Setting, and VPC vRouter Setting. The setting takes effect with the following priority: Global Setting < Cluster Setting < VPC vRouter Setting.
Allows you to enable distributed routing for a VPC vRouter as needed to optimize east-west traffic.
Allows you to enable the SNAT network service for a VPC vRouter as needed.
Supports STS to improve network transmission efficiency.
Supports external monitoring: Collects the VPC vRouter data such as CPU, memory, disk I/O, NIC data from hosts by using libvirt.
Supports internal monitoring: Collects the VPC vRouter data such as CPU, memory, and disk size data from VM instances by using an agent of the VPC vRouter.
Allows you to centrally manage the VPC networks, public networks, and DNS resources associated with a VPC vRouter.
Allows you to set QoS for a VPC vRouter to limit its upstream and downstream bandwidth.
Allows you to centrally manage the network services provided by a VPC vRouter, such as virtual IP addresses, elastic IP address, IPsec tunnels, port forwarding, and load balancing.
Supports OSPF dynamic routing protocols in large-scale network environment.
Supports multicast routing to forward multicast messages sent by multicast sources to VM instances.
Has higher resource priority than VM instances by default. When resource contention occurs, the resource priority is as follows: VM instances with Normal priority < VM instances with High priority < VPC vRouters.
VPC vRouter HA Group A VPC vRouter HA group consists of two VPC vRouters. Either VPC vRouter can be a primary or secondary VPC vRouter for the group. If the primary VPC vRouter does not work as expected, the VPC vRouter becomes the secondary VPC vRouter in the group to ensure high availability of business.
Allows you to manage the lifecycle of VPC vRouter HA groups, such as creating and deleting VPC vRouter HA groups.
Allows you to add a VPC vRouter to an HA group and centrally manage all VPC vRouters in this group. Any configuration changes on a VPC vRouter will apply to its partner VPC vRouter.
vRouter Image Supports two types of vRouter images: VPC vRouter image and dedicated-performance LB image.
Allows you to set the CPU architecture of a vRouter image, including x86_64 and aarch64. Creating VPC vRouters or load balancing instances will inherit the CPU architecture of the original image.
Allows you to upload a vRouter image by using an URL or local browser.
Allows you to manage the lifecycle of vRouter images, such as creating, enabling, disabling, deleting, recover, and completely deleting vRouter images.
Allows you export a vRouter image on the UI from ImageStore or Ceph backup storages.
Allows you to centrally manage exported vRouter images and provides the MD5 value of the downloaded image to check the image integrity.
vRouter Offering Allows you to manage the lifecycle of vRouter offerings, such as creating, enabling, disabling, and deleting vRouter offerings.
SDN Controller Allows you to add external SDN controllers to control network devices such as external switches. This helps to reduce network latency and improve the VXLAN network performance.
Currently, only H3C SDN controllers (VCFC) are supported.
Allows you to manage the lifecycle of SDN controllers, such as creating and deleting SDN controllers.
Management Network A management network is used to manage physical resources in the Cloud.
Allows you to manage the lifecycle of management networks, such as creating and deleting management networks.
Allows you to add IP ranges of the IPv4 type.
Allows you to customize the MTU of a management network to limit the size of network transmission packets.
Monitors and displays the IP usage statistics of management networks, which helps to improve IP planning efficiency.
Allows you to centrally manage the IP ranges (IPv4) on a management network.
Flow Network A flow network is a dedicated network for port mirror transmission. You can use a flow network to transmit the mirrors of data packets of NIC ports to the target ports.
Allows you to manage the lifecycle of flow networks, such as creating and deleting flow networks.
Allows you to add IP ranges of the IPv4 type.
Monitors and displays the IP usage statistics of flow networks, which helps to improve IP planning efficiency.
Allows you to centrally manage the IP ranges (IPv4) on a flow network.
Audit Audits all of the actions performed on network resources, which effectively ensures the security of the cloud environment.
Network Service Security Group Provides security control over VM instances on L3 networks.
Allows you to manage the lifecycle of security groups, such as creating, enabling, disabling, and deleting security groups.
Allows you to add/delete ingress/egress rules of a security group and manage these rules centrally.
Supports ALL, TCP, UDP, and ICMP protocols for security group rules.
Allows you to set a source security group for security group rules.
Security rules apply the allowlist mechanism. Traffic that follows the created rules is allowed to reach the specified ports.
For newly created security groups, ingress and egress rules with the ALL protocol type are configured by default. The rules allow mutual communications among VM instances in the same security group.
Allows you to centrally manage VM NICs, L3 network resources, and other resources associated with a security group.
Virtual IP Address (VIP) Provides multiple network services by using VIPs in bridged network environments.
Divides VIPs into public VIP, flat network VIP, and VPC VIP based on the network where the VIP is created.
Divides VIPs into system VIP and custom VIP based on how the VIP is created.
Allows you to manage the lifecycle of VIPs, such as adding and deleting VIPs.
Allows you to set QoS for public VIPs and flat network VIPs.
Monitors and displays VIP metrics such as network traffic and network packet rate.
Elastic IP Address (EIP) IP addresses in a private network are translated into an EIP that is in another network. This way, private networks can be accessed from other networks by using EIPs.
Divides EIPs into public EIP and flat network EIP based on the network where the EIP is created.
Allows you to manage the lifecycle of EIPs, such as adding and deleting EIPs.
Allows you to associate/disassociate an EIP with/from a VM NIC.
Allows you to change the owner of an EIP.
Port Forwarding Works based on the layer-3 forwarding service provided by VPC vRouters and forwards traffic flows of specified IP addresses and ports in a public network to the specified ports of VM instances. If your public IP addresses are insufficient, you can configure port forwarding for multiple VM instances by using one public IP address and port.
Supports TCP and UDP.
Allows you to manage the lifecycle of port forwarding, such as creating and deleting port forwarding.
Allows you to associate/disassociate port forwarding with/from a VM NIC.
Load Balancing Distributes traffic flows of a VIP to backend servers. It automatically inspects the availability of backend servers and isolates unavailable servers during traffic distribution, which improves the availability and service capability of your business.
Supports two types of load balancing services: shared-performance load balancing that works based on VPC vRouters and dedicated-performance load balancing that works based on load balancer instances.
Allows you to manage the lifecycle of load balancers, such as creating and deleting load balancers.
Allows you to create shared-performance load balancers by using public networks or VPC networks.
Allows you to create dedicated-performance load balancers by using public networks, flat networks, or VPC networks.
Monitors and displays load balancer metrics such as inbound/outbound traffic and active/concurrent/new sessions.
Allows you to centrally manage listeners, backend server groups, and other resources associated with load balancers.
Allows you to manage the lifecycle of load balancers, such as creating and deleting load balancers.
Listener protocols support TCP, HTTP, HTTPS, and UDP.
Supports multiple load balancing algorithms, including Round Robin, Min Connections, Source IP Hash, and Weighted Round Robin.
Health check protocols support TCP, HTTP, and UDP.
Listeners that use the HTTPS protocol allow you to associate/disassociate certificates. You can upload certificates or certificate chains and manage these certificates centrally.
Listeners that use the HTTP or HTTPS protocol allow you to configure forwarding rules for domain forwarding and manage these rules centrally.
Allows you to associate/disassociate listeners with/from backend server groups.
Listeners that use a weighted round-robin load-balancing algorithm allow you to set the weight value for each backend server separately.
Allows you to manage the lifecycle of backend server groups, such as creating and deleting backend server groups.
Allows you add/remove backend server to/from backend server groups.
Allows you to add VM NICs or other servers outside of the Cloud as backend servers. Note that the later method applies to only dedicated-performance load balancers.
Dedicated-performance load balancers allows you to create/delete load balancer offerings.
VPC Firewall Monitors ingress and egress traffic of VPC vRouters and decides whether to allow or block specific traffic based on a defined set of security rules.
Allows you to manage the lifecycle of VPC firewalls, such as creating and deleting VPC firewalls.
Allows you to centrally manage rules and rule sets associated with VPC firewalls.
Allows you to manage the lifecycle of rules, such as adding, enabling, disabling, and deleting rules.
Configures ingress and egress rules by default after a VPC firewall is created and allows you to customize these rules as needed.
Allows you to manually add rules to a VPC firewall by specifying a single IP address or an IP/port set.
Allows you to add multiple rules to a VPC firewall by importing a template. You can also modify the rule template and upload it as needed.
Allows you to set priorities for VPC firewall rules.
VPC firewall rules have three behaviors: Accept, Drop, and Reject.
VPC firewall rules support the following packet status: new (new connection requests), established (established connections), invalid (unidentifiable connections), and related (new connection requests that are associated with existing connections).
VPC firewall rules support the following protocols: ALL, TCP, UDP, ICMP, GRE, ESP, AH, IPIP, VRRP, IPENCAP, PIM, OSPF, and IGMP.
Allows you to manage the lifecycle of rule sets, such as adding and deleting rule sets.
Allows you to centrally manage rules and network resources in a rule set.
Modification on rules in a rule set take effect after you synchronize the modifications.
Allows you to save firewall rules as a rule template (managed by the Cloud or export them as a CSV file (offline).
Allows you to manage the lifecycle of rule templates, such as creating and deleting rule templates.
Allows you to save IP/port sets as a generic template.
Allows you to manage the lifecycle of IP/port sets, such as adding, enabling, disabling, and deleting IP/port sets.
IPsec Tunnel Encrypts and verifies IP packets that transmit over a virtual private network (VPN) from one site to another.
IPsec negotiation mode: Supports only the Main mode due to security reasons. The Aggressive mode is not supported.
IPsec security protocol: Supports only the Encapsulating Security Payload (ESP) protocol.
IPsec encapsulation mode: Supports only the Tunnel mode. The Transport mode is not supported.
IPsec routing model: Supports only policy-based IPSec VPN. Route-based IPSec VPN is not supported. Therefore, the tunnel supports only unicast data, and does not support multicast and broadcast.
Allows you to manage the lifecycle of IPsec tunnels, such as creating and deleting IPsec tunnels.
Allows you to centrally manage network resources associated with an IPsec tunnel.
Dynamic Routing Supports Open Shortest Path First (OSPF) protocols.
Allows you to manage the lifecycle of OSPF areas, such as creating and deleting OSPF areas.
Supports two types of OSPF areas: Standard and Stub.
Provides three authentication methods for OSPF areas: None, Plaintext, and MD5.
Allows you to centrally manage the routing configuration of OSPF areas.
Netflow Monitors the ingress and egress traffic of the NICs of VPC vRouters.
Allows you to manage the lifecycle of netflows, such as creating and deleting netflows.
Supports two versions of data flows: V5 and V9.
Allows you to centrally manage the routing configuration of netflows.
Port Mirroring Mirrors the traffic data of VM NICs and sends the traffic data to the target ports. This helps to analyze the data packets of ports, which simplifies the data monitoring and management and makes it easier to locate network errors and exceptions.
Allows you to manage the lifecycle of port mirroring, such as creating, enabling, disabling, and deleting port mirroring.
Supports three types of sessions: Ingress, Engress, and Bidirection.
Allows you to centrally manage port mirroring sessions.
Route Table Allows you to customize routing configurations as needed.
Allows you to manage the lifecycle of route tables, such as adding, enabling, disabling, and deleting route tables.
Allows you to centrally manage route entries and VPC vRouter resources in routing tables.
Allows you to manage the lifecycle of route entries, such as adding and deleting route entries.
Supports two types of route entries: static route entries and blackhole route entries.
Allows you to set route priorities.
Multicast Route Forwards the multicast messages sent by the multicast source to VM instances, which realizes point-to-multipoint connection between the sender and the receiver.
Allows you to enable multicast route as needed. After enabled, the multicast route takes effect for all networks associated with VPC vRouters.
Supports PIM-SM and PIM-SSM routing protocols. In the PIM-SM protocol, RP routers are the essential device in the PIM-SM domain. The RP addresses support static configuration and dynamic election through the BSR mechanism.
Allows you to centrally manage the multicast configuration tables and multicast routing tables.
Audit Audits all of the actions performed on network resources, which effectively ensures the security of the cloud environment.
CloudFormation Resource Stack Allows you to manage the lifecycle of resource stacks, such as creating and deleting resource stacks.
Allows you to create resource stacks by using a stack template (system template or custom template), uploading a file (in UTF8-encoded format), or customizing a text (in the designer).
Allows you to preview the template configurations before you complete the creation.
Allows you to centrally manage the templates, resources, and events associated with a resource stack.
Stack Template Allows you to manage the lifecycle of stack templates, such as creating, enabling, disabling, and deleting stack templates.
Allows you to create stack templates by customizing a text or uploading a file.
Allows you to modify the template content as needed.
Sample Template Provides commonly used sample templates for your reference.
Allows you to manage the lifecycle of sample templates, such as enabling and disabling sample templates.
Designer Allows you to establish dependencies between resources by drag-and-drop connections on the canvas.
Allows you to undo, redo, zoom in, zoom out, fit to canvas, delete, and clear the canvas.
Allows you to set global parameters of the following types: String, Number (integer or floating point), Comma-delimited list (equivalent to List<String> in Java), and Boolean.
Allows you to preview templates, generate resource stacks, and save as stack templates.
Audit Audits all of the actions performed on CloudFormation, which effectively ensures the security of the cloud environment.
Network Topology Global Topology Displays the network topology in the Cloud, helping you to manage and maintain your networks more efficiently.
Allows you to refresh the topology to view latest information.
Allows you to export the global topology in PNG format.
Allows you to hide or unhide VM instances, highlight the selected resources, view the resource information in hover, and view the VM/VPC vRouter status.
Allows you to fit to window and zoom in, zoom our the canvas.
Allows you to search for resources by resource category and attribute within the current global topology.
Custom Topology Allows you to generate a custom topology.
Allows you to refresh the topology to view latest information.
Allows you to export the custom topology in PNG format.
Allows you to highlight the selected resources, view the resource information in hover, and view the VM/VPC vRouter status.
Allows you to fit to window and zoom in, zoom our the canvas.
Allows you to search for resources by resource category and attribute within the current global topology.
Performance Analysis View Performance Analysis Displays the performance metrics of key resources.
Allows you to view the monitoring data by resources, including VM instance, VPC vRouter, host, backup storage, L3 network, and virtual IP.
Supports two monitoring methods: external monitoring and internal monitoring.
Allows you to view the monitoring data by selecting a time span. Available time spans: 15 minutes, 1 hour, 1 week, and custom.
Supports advanced filtering, including filter by monitoring items (metrics and thresholds), resource scope (all resources/specified resources), and owner scope (all owners/specified owners).
Allows you to sort the items by resource name or monitoring metric.
Allows you to view the monitoring data details of a single resource.
Allows you to customize the number of items to be displayed on each page. By default, 10 items are displayed per page.
Export Performance Analysis Report Allows you to export all the report information or export the information on the current page in CSV format.
Allows you to export the average, maximum, or minimum values of the metrics for VM instances and VPC vRouters.
Capacity Management Resource Capacity Card Displays the capacities and usages of key resources as cards in the Cloud.
Supports the following resources: primary storage, backup storage, management node, VM instance, volume, image, snapshot, and computing node.
Allows you to jump to the corresponding resource list from the current card.
Resource Capacity Top 10 Allows you to view top 10 resources based on the capacity usage.
Supports the following resources: host, primary storage, backup storage, VM instance, volume, image, and snapshot.
Allows you to sort resources by capacity utilization, used physical capacity, available physical capacity, total physical capacity.
Allows you to view the disk usage details of a single resource.
Management Mode Monitoring / Allows you to view the health status of each management node in a multi-management node environment.
Allows you to view the management IP and node status.
Allows you to view the management service status, including whether the monitor IP is reachable, whether the peer management node is reachable, whether the virtual IP is reachable, and the database status.
Monitoring and Alarm Alarm Monitors time-series data and events and sends alarm messages to specified endpoints.
Supports default alarms and custom alarms.
Supports resource alarms, event alarms, and extended alarms.
Allows you to manage the lifecycle of default resource alarms, such as enabling and disabling default resource alarms.
Allows you to manage the lifecycle of custom resource alarms, such as enabling and disabling custom resource alarms.
Allows you to create resource alarms for two types of time-series data: resource utilization and resource capacity.
Provides three emergency levels for resource alarms: emergent, major, and info.
Allows you to enable alarm recovery notification for resource alarms as needed. If enabled, when a resource monitored by a resource alarm recovers from the alarmed status, the system receives a notification.
Allows you to centrally manage the endpoints and alarm records of a resource alarm.
Allows you to manage the lifecycle of custom event alarms, such as enabling and disabling custom event alarms.
Provides three emergency levels for event alarms: emergent, major, and info.
Allows you to centrally manage the endpoints and alarm records of an event alarm.
Allows you to manage the lifecycle of extended alarms, such as enabling and disabling extended alarms.
Allows you to centrally manage the endpoints and alarm records of an extended alarm.
One-click Alarm Provides a set of alarm rules for critical resources, which can be used to quickly establish monitoring and alarm services for these resources.
Applies to resources such as hosts, VM instances, and VPC vRouters.
Allows you to enable or disable one-click alarms.
Allows you to enable, disable, and modify a single alarm rule for a one-click alarm.
Alarm Template Encapsulates alarm rules as a template and works with resource groups. You can configure alarm rules for resources in bulk, which helps to improve the O&M efficiency.
Allows you to manage the lifecycle of alarm templates, such as creating and deleting alarm templates.
Allows you to add/remove alarm rules to/from alarm templates and centrally manage these rules in an alarm template.
Allows you to attach/detach tags to/from an alarm template.
Allows you to clone an alarm template.
Allows you to associate/disassociate resource groups with/from an alarm template and centrally manage these resource groups of an alarm template.
Resource Group Groups resources based on business requirements and works with alarm templates. You can configure alarm rules for resources in bulk, which helps to improve the O&M efficiency.
Allows you to manage the lifecycle of resource groups, such as creating and deleting resource groups.
Allows you to add/remove resources to/from a resource group and centrally manage these resources in a resource group.
Allows you to attach/detach tags to/from a resource group.
Allows you to associate/disassociate alarm templates with/from a resource group.
Allows you to centrally manage the alarms, endpoints, and alarm records of a resource group.
Message Template Sends messages to endpoints by using a text template.
Allows you to manage the lifecycle of message templates, such as creating and deleting message templates.
Supports the following endpoints: email, DingTalk, Microsoft Teams, and short message.
Supports the following alarm types: resource alarm and event alarm.
Supports the following types of message texts: alarm message text and recovery message text.
Allows you to make a template default or cancel the default setting. Only one default template is allowed.
Allows you to modify the content in a message template.
Message Source Allows you to connect to extended message sources.
Allows you to manage the lifecycle of message sources, such as creating, enabling, disabling, and deleting message sources.
Supports Ceph Enterprise.
Provides preconfigured alarm message conversion template and allows you customize parameters in the template.
Endpoint Allows you to obtain your subscribed information by using an endpoint.
Supports default endpoints and custom endpoints (email, short message, HTTP application, DingTalk, and Microsoft Teams).
Default endpoints receive messages sent from the Cloud.
Allows you to manage the lifecycle of default endpoints, such as enabling and disabling default endpoints.
Allows you to manage the lifecycle of custom endpoints, such as creating, enabling, disabling, and deleting custom endpoints.
Allows you to add/remove alarms to/from an endpoint and centrally manage these alarms, including resource alarms and event alarms.
Allows you to centrally manage messages (alarm messages and extended messages) received by an endpoint.
Audit Audits all of the monitoring and alarm actions, which effectively ensures the security of the cloud environment.
Alarm Message Cloud Platform Alarm Message Allows you to view and manage alarm messages sent from the Cloud centrally.
Displays alarm messages of different emergency levels in the last seven days on a bar chart.
Displays alarm messages of different resources in the last seven days on a pie chart.
Allows you to view up to 1,000 alarm messages in the message list.
Allows you to filter messages by resource.
Allows you to filter messages by specifying a time span.
Allows you to mark alarm messages as read and filter read or unread messages as needed.
Allows you to filter messages by emergency levels (emergent, major, and info).
Allows you to filter messages by alarm type (resource alarm and event alarms).
Allows you to converge and sort alarm messages based on the alarm times.
Allows you to set a silence period for alarm messages. During the silence period, no alarm messages will be generated. You can process the alarm information when you are convenient.
Allows you to cancel the silence period for alarm messages.
Allows you to view the details about an alarm.
Extended Alarm Message Allows you to take over third-party alarm messages and push, manage them centrally.
Allows you to mark alarm messages as read and filter read or unread messages as needed.
Allows you to filter messages by specifying a time span.
One-click Inspection Five Inspection Categories Provides five inspection categories, including platform, compute, network, storage, and global setting. These categories cover all key resources and services of the Cloud.
Multi-layer Healthiness Scoring Mechanism Provides an in-built three-layer healthiness scoring mechanism that scores resources and services, inspection items, and the overall Cloud. It also displays the score of the Cloud.
O&M Suggestion Provides O&M suggestions on resources in warning or fault status.
Inspection Report Provides inspection introduction, summary, and results, and details of abnormal inspection items as well as O&M suggestions.
Inspection Management Allows you to select inspection items for one-click inspection.
Allows you to pause, resume, and cancel inspection, implement re-inspection, and export PDF-formatted inspection reports.
Operation Log Current Task Allows you to view and manage operations that are being performed.
Displays the task progress and remaining time in real time.
Allows you to cancel, suspend, and continue a current task as needed.
Allows you to view the details about a current task.
Historic Operation Displays the historic operations performed in the Cloud.
Allows you to view all the operations that were performed.
Allows you to filter operation logs by specifying a time span.
Allows you to filter operation logs by task results, including succeeded, failed, canceled, canceling, exception, timeout, suspended, and unknown.
Allows you to filter operation logs by operators.
Allows you to export operation logs in CSV format.
Allows you to view the details about an operation log.
Allows you to set the operation log retention period in the Global Setting.
Auto-Scheduling Logs Displays the VM auto-scheduling logs triggered by the management node, such as VM recovery from HA and host maintenance.
Allows you to view all the auto-scheduling logs that were triggered.
Allows you to filter auto-scheduling logs by specifying a time span.
Allows you to filter auto-scheduling logs by task results, including succeeded and failed.
Allows you to export auto-scheduling logs in CSV format.
Allows you to view the details about an auto-scheduling log.
Allows you to set the auto-scheduling log retention period in the Global Setting.
Audit / Monitors and records all activities in the Cloud, which effectively ensures the security of the cloud environment.
Allows you to filter audit records by resource actions and login actions.
Allows you to filter audit records by specifying a time span.
Allows you to filter audit records by task results, including succeeded and failed.
Allows you export audit records in CSV format.
Allows you to view the details about an audit record.
Scheduled O&M Scheduled Job Allows you to manage the lifecycle of scheduled jobs, such as creating, enabling, disabling, and deleting scheduled jobs.
Supports VM instances and volumes.
Allows you to view job records centrally.
Allows you to attach/detach schedulers to/from a scheduled job.
Scheduler Allows you to manage the lifecycle of schedulers, such as creating and deleting schedulers.
Allows you to centrally manage the scheduled jobs of a scheduler.
Allows you to centrally manage schedulers that were completed.
Audit Audits all of the scheduled O&M actions, which effectively ensures the security of the cloud environment.
Tag / Allows you to customize tags for resources and quickly locate resources by tag type and tag name.
Supports admin tags and tenant tags.
Allows you to manage the lifecycle of tags, such as creating and deleting tags.
Allows admins to attach/detach tags to/from all resources on the Cloud and tenants to attach/detach tags to/from resources of tenants.
Allows you to centrally manage resources with a tag attached.
Audits tag actions, which effectively ensures the security of the cloud environment.
Billing Management Bills A bill is the expense of resources totaled at a specified time period. Billing is accurate to the second.
Supported bill types; project bills, department bills, and sub-account bills.
Allows you to filter bills by specifying a time span.
Allows you to view project bills in a list, export all of the project bills in CSV format, view the billing details of a single project, and export the bills of a single project in CSV format.
Allows you to view department bills in a list, view the bills of the current department or its sub-departments, view the bills of directly affiliated projects in a list, export total bills of all directly affiliated projects in CSV format, view the billing details of a single project, and export the bills of a single project in CSV format.
Allows you to view sub-account bills in a list, export all of the sub-account bills in CSV format, view the billing details of a single sub-account, and export the bills of a single sub-account in CSV format.
Allows you to disable the billing feature in Global Setting. Then, the system stops billing resources and bills are no longer generated.
By default, bills are generated every day at 00:00. You can change the bill generation time in Global Setting.
Allows you to set the currency symbol displayed on the UI in Global Setting. Default value: ¥. Valid values: ¥, $, €, £, A$, HK$, ¥, CHF, and C$.
Pricing List A pricing list is a list of unit prices of different resources. The unit price of a resource is set based on the specification and usage time of the resource.
Allows you to manage the lifecycle of pricing lists, such as creating and deleting pricing lists.
Allows you to set the unit price for the following resources: CPU/memory, volume (root volume/data volume), GPU device (desktop GPU and compute GPU), network (VM public IP and virtual IP), and elastic baremetal instance (elastic baremetal offering).
Allows you to generate bills based on disk performances. You can set the billing unit price for root volumes and data volumes with different performances by setting advanced parameters.
Allows you to modify the billing unit price as needed.
Allows you to centrally manage the price history and related resources.
Access Control Console Proxy Allows you to set a console proxy to log in to a VM instance.
Allows you to reconnect a console proxy.
AccessKey Management An AccessKey pair is a security credential that one party authorizes another party to call API operations and access its resources in the Cloud.
Supports two types of AccessKey: local AccessKey and third-party AccessKey.
Allows you to manage the lifecycle of local AccessKeys, such as generating, enabling, disabling, and deleting local AccessKeys.
Allows you to manage the lifecycle of third-party AccessKeys, such as generating and deleting third-party AccessKeys.
Audits all of the AccessKey actions, which effectively ensures the security of the cloud environment.
IP Allowlist/Blocklist An IP blocklist or allowlist identifies and filters IP addresses that access the Cloud.
Allows you to enable the IP allowslist/blocklist feature in Global Setting as needed.
Allows you to manage the lifecycle of IP allowslists/blocklists, such as adding and deleting IP allowslists/blocklists.
Audits all of the IP allowslist/blocklist actions, which effectively ensures the security of the cloud environment.
Application Center / Allows you to add URLs of third-party applications. This allows you to manage the applications in a centralized way and quickly open the applications.
Supports the following types of applications: storage, database, security, IaaS, PaaS, and SaaS applications.
Allows you to set the sharing mode of a resource, including share globally, share to specified projects or accounts, and not share.
Allows you to manage the lifecycle of applications, such as adding and deleting applications.
Sub-Account Management / A sub-account is a type of tenant that is created and managed by the admin. Resources created under a sub-account are managed by the sub-account.
Allows you to manage the lifecycle of sub-accounts, such as creating and deleting sub-accounts.
Allows you to set the initial password or change the password of a sub-account.
Allows you to bill for resources used by sub-accounts, attach pricing lists to a sub-account, and change pricing lists for the sub-account.
Allows you to set two-factor authentication for sub-account login, view the two-factor QR codes of the sub-account, and download the two-factor QR codes.
Allows you to set and manage resource quota for sub-accounts, including compute resources, storage resources, and network resources.
Allows you to centrally manage the associated or shared resources of a sub-account.
Audits all of the sub-account actions, which effectively ensures the security of the cloud environment.
System Setting Theme and Appearance Allows you to customize the theme and appearance of the Cloud.
Allows you to set the global appearance (theme), titles (browser/login interface/platform interface), and monitor (title and appearance/data monitoring method).
Allows you to reset to default settings with one click.
Email Server If you select Email as the endpoint of an alarm, you need to set an email server. Then alarm messages are sent to the email server.
Allows you to manage the lifecycle of email servers, such as adding, enabling, disabling, and deleting email servers.
Supported email server type: SMTP.
Supported encryption type: STARTTLS, SSL/TLS, and NONE.
Allows you to test the email server connectivity.
Allows you to change the owner of email servers.
Audits all of the email server actions, which effectively ensures the security of the cloud environment.
Log Server A log server is used to collect logs of the management node. You can add a log server to the cloud and use the collected logs to locate errors and exceptions. This makes your O&M more efficient.
Allows you to manage the lifecycle of log servers, such as adding and deleting log servers.
Allows you to set the log severity from LOCAL0 to LOCAL7.
Allows you to test the log server connectivity.
Audits all of the log server actions, which effectively ensures the security of the cloud environment.
Platform Setting Scenario Template Provides multiple templates that encapsulate scenario-based global settings. You can apply a template globally with one click based on your business needs. This improves your O&M efficiency.
Applies to VM performance optimization, restoration from high availability, cloud security setting, and production environment setting.
Allows you to apply a scenario template with one click.
Allows you to reset to default settings with one click.
Allows you to modify settings of a single item in a scenario template.
Global Setting Allows you to configure settings that take effect on the whole platform.
Support basic settings and advanced settings.
Allows you to reset to default settings with one click.
Supports quick search and directory navigation to help you quickly locate target items.
Allows you to modify settings of a single item in Global Setting.
License Management Licensing in the Cloud is supplied in different functionality packages as Base and Plus.
You can purchase a package as needed.
The Base license provides the basic and essential features of the Cloud, which can meet the mainstream business requirements.
Functionalities covered in the Base license include Basic, Standard, Enterprise Trial, and Enterprise Prepaid.
The Plus license provides add-on features or feature enhancements to meet the specific business requirements.
Functionalities covered in the Plus license include VMware Management, Enterprise Management, ARM64 Management, Backup Service, Continuous Data Protection (CDP) Service, Migration Service, Baremetal Management, Elastic Baremetal Management, Alibaba Cloud Hybrid Cloud Management, Cryptography Security Compliance, 5x8 (7x24) After-Sales Service, SR-IOV NIC Service, GPU Service, Billing Management, CloudFormation, Auto-Scaling Service, and Smart NIC Service.
A Base license is required to install the Plus license.
Supports two licensing methods: USB key and request key.
The USB key licensing method allows you to obtain the authorization by inserting only one USB key into the management node.
The request key method allows you to obtain the authorization by uploading the license file to the management node.
Allows you to view the current license status and licensing records.
Allows you to delete a Plus license as needed.
Provides license expiration reminders when your license is about to expire, expired, or license quota exceeds.
Cloud Login Login Method Allows you to access the UI via HTTP or HTTPS.
Supports account login and project login.
Allows you to access the Cloud and experience all of the features by using command lines.
Login Security Allows you to set the maximum number of continuous login failures that trigger verification by verification code. Default: 6.
Supports two-factor authentication, which further enhances the account security.
Allows you to set the login password complexity by set the password length and characters combined of digits, uppercase/lowercase letters, and special characters.
Allows you to set the password validity period by customizing the password update cycle. We recommend that you change the login password regularly to ensure the login security.
Supports historical password check and allows you to customize the number of recent passwords that cannot be reused.
Allows you to specify whether to lock the login account if the logins continuously fail, the number of allowed failed attempts, and how long the account will be locked.
Allows you to specify whether to disallow simultaneous connection sessions established by one user. If yes, one user can establish only one connection session with the platform.
Allows you to set the login interface with the default link.
VDI Solution Supports SPICE, RDP, and VNC protocols.
Allows you to specify a VDI network.
Supports USB redirection, which means multiple USB devices are compatible.
Allows you to set an independent VDI network.
Supports multi-screen display.
Supports microphones.
Supports SPICE to optimize traffics.
UI Highlights Quick Navigation Provides a quick navigation entry, which is convenient for users to quickly locate and enter the required features and services.
Global Search Provides one-stop global search, allowing you to search for features, resources, and documents.
Embedded Document Provides embedded documents in the help center.
Installation / Allows you to complete installing and deploying the Cloud from scratch within just 30 minutes with one simple command.
Supports the following installation modes: Enterprise Management Node, Community Management Node, Compute Node, Expert Mode, and Simplified Expert Mode.
Supports custom ISO: c74 ISO and c76 ISO.
Allows you to burn ISO images to U drives by using Rufus.
Upgrade Seamless Upgrade Allows you to seamlessly upgrade your Cloud from an earlier version to a later version.
Incremental Upgrade Supports incremental upgrade, which improves the upgrade speed greatly.
Deployment Environment Upgrade Allows you to specify the deployment environment from the Expert Mode.

Features in VMware Management

Type Features Description
vCenter Basic Resource Allows you to take over vCenter 5.0, 5.1, 5.5, 6.0, 6.5, 6.7, and 7.0 in the Cloud.
Supports HTTPS and HTTP. HTTPS is the default protocol.
Automatically synchronizes data when you add vCenter to the Cloud for the first time and allows you to synchronize data manually. You can enable vCenter Data Auto Sync in the Global Setting and set the synchronization interval as needed.
Allows you to centrally manage resources associated with vCenter, including clusters, primary storages, backup storages, hosts, and resource pools.
Allows you to delete a vCenter, which deletes only the resources records. Remote data is not affected.
VM Instance Allows you to manage the lifecycle of vCenter VM instances, such as creating, booting, stopping, rebooting, resuming, pausing, powering off, deleting, and recovering vCenter VM instances.
Allows you to launch the console of a vCenter VM instance. You can also set the console password as needed.
Allows you to clone a vCenter VM instance online or offline without data volumes.
Allows you to hot migrate a vCenter VM instance in a shared storage environment.
Allows you to modify the instance offering (CPU/memory) of a vCenter VM instance when the VM instance is in the stopped state.
Allows you to change the owner of a vCenter VM instance when the VM instance is in the running/stopped state.
Allows you to set the HA level (None/NeverStop) for a vCenter VM instance. You can enable the HA feature in the Global Setting as needed.
Allows you to customize tags for vCenter VM instances so that you can locate them quickly.
Supports external monitoring: Monitors the vCenter VM data such as CPU, memory, disk, virtual disk, and NIC.
Allows you to manage resources associated with a vCenter VM instance, such as volumes and NICs.
Network Supported L2 networks: L2NoVlanNetwork and L2VlanNetwork.
Supported L3 networks: public network, flat network, and VPC network.
Supported switches: dvSwitch and vSwitch.
Supported VPC network services: SNAT, DHCP, elastic IP, port forwarding, load balancing, and IPsec tunnel.
Allows you to create L2/L3 networks and delete L3 networks.
Allows you to set the sharing mode of an L3 network, including share globally, share to specified projects or accounts, and not share.
Collects statistics on IP usage of L3 networks, which helps to improve IP planning efficiency.
Allows you to attach a cluster to an L2 network corresponding to an L3 network.
Allows you to centrally manage IPv4 network ranges of an L3 network.
Volume Allows you to manage the lifecycle of vCenter volumes, such as creating, enabling, disabling, deleting, recovering, and expunging vCenter volumes.
Allows you to attach/detach a volume to/from an instance.
Allows you to change the owner of a vCenter volume.
Image Allows you to add two types of vCenter images: system image in VMDK format and volume images in VMDK format.
Allows you to set the platform type (Linux/Windows/Other) for a vCenter image.
Allows you to upload a vCenter image by using a URL.
Allows you to manage the lifecycle of vCenter images, such as adding, enabling, disabling, deleting, recovering, and expunging vCenter images.
Allows you to set the sharing mode of a vCenter image, including share globally, share to specified projects or accounts, and not share.
Allows you to change the owner of a vCenter image.
Event Message Displays event alarm messages of the vCenter that you took over, helping you to locate problems quickly.
Allows you to view the event messages by selecting a time span.
Multi-tenant Management Allows tenants to manage the lifecycle of resources such as VM instances and volumes of a vCenter to which the tenant belongs.
Allows tenants to use vCenter resources such as networks and images shared by the admin.
Allows tenants to view the usage of KVM VM instances and vCenter VM instances on the dashboard.
Allows tenants to view the billing information of KVM and vCenter resources.
Allows project members to apply for vCenter VM instances through tickets.
Audit Audits all of the vCenter actions, which effectively ensures the security of the cloud environment.

Features in Enterprise Management

Type Feature Description
Organization User A user is a natural person that constructs the most basic unit in Enterprise Management.
Organization Organization is the basic unit of an organizational structure in Enterprise Management. You can create an organization or synchronize an organization through 3rd party authentication.
Role A role is a collection of permissions used for entitling users to manage resources by calling associated APIs.
3rd-party Authentication The 3rd-party authentication feature allows you to integrate third-party authentication systems to the Cloud. Then you can use a third-party account to log in to the Cloud and use the resources in the Cloud. You can add an AD or LDAP server to the Cloud.
Project Management Project A project is a task that needs to be accomplished by specific personnel at a specified time. Resources and budgets are also specified for projects. In Enterprise Management, you can plan resources at the project granularity and allocate an independent resource pool for a project.
Project Template A project template mainly identifies templates of various resource quotas. When creating projects, you can use the quotas defined in these templates to directly configure projects.
Project Member A project member is a user that joins a project. Project members include project admins, project managers, and ordinary project members.
Member Group A member group is a collection of natural persons or a collection of project members. You can use a member group to grant permissions.
Set QoS The admin and platform members can set QoS for VM instances, volumes, and NICs.
Ticket Management Ticket Submission Project members can apply for cloud resources by submitting a ticket.
Ticket Approval The admin, project admin, and department manager can approve or reject a ticket.
Custom Process Management The admin can customize ticket processes of different types.
Independent Zone Management Platform Manager A platform manager is a kind of admin that has the zone attribute.
Resource Isolation You can specify a zone manager to manage equipment rooms in each zone independently.

Features in Backup Service

Type Features Description
Backup Service Backup Job Dashboard Supports intuitive viewing and unified management of backup jobs on the Cloud to improve O&M efficiency.
Displays backup job overview on different cards, including the number, state, and status of backup jobs.
Displays backup job statistics in line chart and list format.
Allows you to set a time filter to view the execution of backup jobs within the selected time period. The time filter applies to both the line chart and list.
Allows you to view backup job execution details.
Backup Job Allows you to create a backup job to back up local VM instances, volumes, or databases to a specified storage server. Local backup, remote backup, and Public Cloud backup are currently supported.
Allows you to manage the lifecycle of a backup job, such as creating, enabling, disabling, and deleting a backup job.
Allows you to specify a local backup server for a backup job. If two local backup servers are specified, the failover mechanism is supported.
Allows you to specify a remote backup server for a backup job. Only one remote backup server is supported.
Allows you to set a network QoS and disk QoS for VM or volume backup jobs.
Allows you to back up a VM instance with its attached volumes.
Allows you to set a backup mode for a VM instance/volume backup job (incremental backup + default full backup, incremental backup + custom full backup).
Allows you to specify a backup mode for a backup job of management node database (full backup mode).
Supports backup immediately after the job creation (VM instances/volumes backup jobs only).
Allows you to manually perform a backup job, providing convenience for backing up important operations at any time.
Allows you to set a data retention policy for a backup job, including local retention policy (by count/by time) and remote retention policy (permanently/by count/by time).
Allows you to manage the backup resource of a backup job, including associating, disassociating, and viewing monitoring data in real time.
Allows you to set a time filter to view backup job records within the selected time period.
Significantly improves large file backup performance by optimizing the large file backup mechanism, supporting both physical and virtual tape libraries (requires tape library to provide file system mounting software, such as LTFS).
Local Backup Data Local backup data of VM instances, volumes, and databases is stored in local backup servers.
Allows you to recover the local backup data of VM instances/volumes to local. Supported recovery policy: new resource and overwrite original resource.
Allows you to recover a VM instance with its attached volumes. (The local backup data of the VM instance needs to contain volume backup data.)
Allows you to recover local backup data from management node database to local.
Allows you to change the owner of the local backup data of a VM instance.
Allows you to scan a local backup server, and displays local backup data of the management node database on the cloud platform.
Allows you to export the local backup data of the management node database to the specified path of the local backup server, which is available for download.
Allows you to delete the local backup data.
Allows you to view the details of the VM/volume local backup data.
Local Backup Server Supports two types of addition: existing backup storage (ImageStore only) and add server.
Allows you to specify the backup network. In local backup scenarios, both data backup and recovery are implemented by using the backup network.
Allows you to manage the lifecycle of a local backup server, such as creating, enabling, disabling, reconnecting, and deleting a local backup server.
Allows you to scan a local backup server and display the local backup data record on the cloud platform.
Allows you to clean up the invalid backup data and expired temporary data that have been completely deleted from the local backup server to free up the storage space.
Allows you to update the password of the local backup server.
Allows you to manage the backup data on local backup server, including VM instances, volumes, and the local backup data on database.
Displays local backup server resource in a real time by using monitors, including capacity percent used, NIC, CPU, memory, and disk.
Remote Backup Server Allows you to add only one remote backup server. Supported type: remote backup and Aliyun backup.
Allows you to manage the lifecycle of a remote backup server, such as adding, enabling, disabling, reconnecting, and deleting a remote backup server.
Allows you to update the password of a remote backup server.
Allows you to clean up the invalid backup data and expired temporary data that have been completely deleted from a remote backup server to free up the storage space.
Allows you to manage the resources on a remote backup server, including backup data (VM instances, volumes, and the remote backup data on database) and zone.
Remote Backup Data Allows you to view the remote backup data of VM instances, volumes and management node database in a list.
Allows you to synchronize the remote backup data of VM instances and volumes to a local backup server.
Allows you to recover the remote backup data of VM instances/volumes to local. Note that the remote backup data needs to synchronize to local backup server first before recovering to local.
Allows you to recover the remote backup data of management node database to local.
Allows you to scan the remote backup server, and display remote backup data of the management node database on the cloud platform.
Allows you to export the remote backup data of the management node database to the specified path of the remote backup server, which is available for download.
Allows you to delete the remote backup data.
Audit Audits all of the backup service actions, which effectively ensures the security of the cloud environment.

Features in Continuous Data Protection (CDP) Service

Type Features Description
Continuous Data Protection (CDP) CDP Dashboard Displays the critical CDP information on different cards, including the number and status of CDP tasks and recovery tasks, the CPU and memory utilization of backup servers, top 5 backup server usage, the total disk I/O of backup servers, and unread alarm statistics in recent 7 days.
CDP Task Allows you to create CDP tasks to continuously back up your VM data to a specified backup server to achieve continuous data protection.
Allows you to create CDP tasks in bulk for multiple VM instances. The Cloud support only one VM instance per CDP task.
Allows you to perform entire VM backup without installing an agent for your VM instances.
Performs a full backup on the VM instances immediately after you create CDP tasks.
Provides second-level fine-grained continuous data protection for VM instances.
Recommends the desired capacity required by a CDP task based on an algorithm when you create a CDP task for the first time, helping you to plan the backup space reasonably.
Supports multiple primary storages: The CDP service applies to VM instances in different primary storage scenarios, including local, NFS, SharedBlock, and Ceph primary storages.
Allows you to manage the lifecycle of CDP tasks, such as creating, enabling, disabling, and deleting CDP tasks.
Allows you to modify the protection policy of a CDP task, including the recovery point interval, regular backup frequency, recovery point retention policy, and the backup rate when the CDP task is disabled.
Allows you to modify task running policy to adjust the desired size and RPO policy for the CDP task.
Allows you to view the creation progress of a CDP task.
Provides CDP task resource alarms and event alarms and allows you to create these alarms.
CDP Data Allows you to back up CDP data on a local backup server.
Displays the CDP status in charts and tables and allows you to view the details by specifying a time span.
Displays hourly data changes so that you plan the backup capacity more reasonably.
Provides a recovery point calendar, which identifies the dates with recovery points with colors and helps you to locate recovery points quickly.
Allows you to lock recovery points. After a recovery point is locked, data of the recovery point will not be automatically cleared or deleted.
Provides recovery point list and locked recovery point list and allows you to view the details by specifying a time span.
Supports fast recovery based on selected recovery points (including locked recovery points).
Supports instant recovery with a minimum RTO in seconds.
Supports entire restoration and file-level restoration.
Entire restoration allows you to restore data to the original VM instance or to a newly-created VM instance.
Restore data to a newly-created VM instance: Allows you to create a VM instance from the selected recovery point without affecting the original VM instance.
The newly created VM instance will quickly start up for business recovery.
Restore to the original VM instance: Allows you create new volumes or overwrite current volumes.
Create new volumes: This method allows you to retain and attach volumes before recovery to the VM instance to ensure data security.
Overwrite current volumes: This method will overwrite the original data in the VM instance and keep the snapshots in the current volumes.
During data restoration, the original VM instance will quickly start up for business recovery.
File-level restoration allows you to retrieve files without restoring the system. Both Windows and Linux file system formats are supported. Supported file format include picture, text, and PDF.
Allows you to clear CDP data, which will delete all the CDP data of the VM instance, including the locked recovery points. The Cloud performs full backup for the VM instance the next time the CDP task is enabled.
Recovery Task Provides a list of recovery tasks, allowing you to view the recovery records and progress in a more friendly way.
Allows you to restore data through a wizard-style process.
Supports multiple primary storages: The CDP service applies to VM instances in different primary storage scenarios, including local, NFS, SharedBlock, and Ceph primary storages.
Supports instant recovery with a minimum RTO in seconds.
Allows you to restore data to the original VM instance or to a newly-created VM instance.
Restore data to a newly-created VM instance: Allows you to create a VM instance from the selected recovery point without affecting the original VM instance.
The newly created VM instance will quickly start up for business recovery.
Restore to the original VM instance: Allows you create new volumes or overwrite current volumes.
Create new volumes: This method allows you to retain and attach volumes before recovery to the VM instance to ensure data security.
Overwrite current volumes: This method will overwrite the original data in the VM instance and keep the snapshots in the current volumes.
During data restoration, the original VM instance will quickly start up for business recovery.
Allows you to manage the lifecycle of recovery tasks, such as creating, enabling, disabling, and deleting recovery tasks.
Allows you to rerun a failed or canceled recovery task.
Allows you to cancel a task only during the recovery progress. After a task is canceled, intermediate data generated during the recovery process will not be retained.
Local Backup Server Allows you to back up CDP data on a local backup server.
Allows you to use the ImageStore deployed in your local data center as the local backup server, or deploy a new local backup server.
Allows you to ad multiple local backup servers.
Allows you to view the CDP data saved to the local backup server on the local backup server details page.
Audit Audits all of the CDP actions, which effectively ensures the security of the cloud environment.

Features in Migration Service

Type Features Description
Migration Service V2V Migration (VMware → the Cloud) Allows you to migrate VM instances from the vCenter you took over to the current Cloud.
Supported vCenter versions: 5.0, 5.1, 5.5, 6.0, 6.5, 6.7, and 7.0.
Supported vCenter VM operating systems: RHEL 4.x/5.x/6.x/7.x, CentOS 4.x/5.x/6.x/7.x, SLES 11/12/15, Ubuntu 12/14/16/18, and Windows 7/Server 2003 R2/Server 2008 R2/Server 2012 R2/Server 2016/Server 2019.
The type of the source primary storage is not enforced.
Supported destination primary storages: LocalStorage, NFS, Ceph, and SharedBlock.
Allows you to manage the lifecycle of V2V jobs, such as creating, rebooting, and deleting V2V jobs.
Allows you to create V2V jobs for VM instances in bulk. The Cloud supports only one V2V job per source VM instance.
Allows you to enable the compression mode as needed, which can effectively compress the migration data cache and improve the cache space utilization of the V2V conversion host.
Allows you to customize the configurations of the destination VM instances.
Allows you to view the progress bar of the V2V jobs.
Automatically installs WindowsVirtIO drivers for Windows VM instances during the migration process, which improves the NIC and disk efficiency.
V2V Migration (KVM → the Cloud) Allows you to migrate VM instances from a KVM platform to the current Cloud.
Allows you to migrate VM instances that are in the running or paused state.
The type of the source primary storage is not enforced.
Supported destination primary storages: LocalStorage, NFS, Ceph, and SharedBlock.
If the source primary storage or the destination primary storage is Ceph, before you can perform V2V migration, make sure that the libvirt and QEMU version is 1.2.16 and 1.1 or above. If neither the source primary storage nor the destination primary storage is Ceph, before you can perform V2V migration, make sure that the libvirt and QEMU version is 1.2.9 and 1.1 or above.
Allows you to manage the lifecycle of V2V jobs, such as creating, rebooting, and deleting V2V jobs.
Allows you to create V2V jobs for VM instances in bulk. The Cloud supports only one V2V job per source VM instance.
Allows you to enable the compression mode as needed, which can effectively compress the migration data cache and improve the cache space utilization of the V2V conversion host.
Allows you to customize the configurations of the destination VM instances.
Allows you to view the progress bar of the V2V jobs.
V2V Conversion Host Allows you to specify a host in the destination cluster as a V2V conversion host. The migration data is firstly cached in the V2Vconversion host and then migrated to the destination primary storage.
Allows you to manage the lifecycle of V2V conversion hosts, such as adding, enabling, disabling, and deleting V2V conversion hosts.
Makes sure the type of the V2V conversion host is consistent with that of the source platform when you create a V2V job.
The state of a V2V conversion host is decoupled from that of the host added as the V2V conversion host. When the V2V conversion host is enabled but the host is disabled, the V2V conversion host is used exclusively for V2V migration scenario, and other VM instances will not be dispatched to the V2V conversion host. This effectively improves the migration efficiency.
Allows you to set an independent migration network and network QoS to control transmission bottleneck and improve migration efficiency.
Monitors and displays the capacity usage of V2V conversion hosts.
Audit Audits all of the V2V actions, which effectively ensures the security of the cloud environment.

Features in Baremetal Management

Type Features Description
Baremetal Management Baremetal Cluster Provides independent cluster management for baremetal chassis.
Allows you to manage the lifecycle of baremetal clusters, such as creating, enabling, disabling, and deleting baremetal clusters.
Allows you to attach/detach a deployment server to/from a baremetal cluster.
Allows you to attach/detach L2 networks to/from a baremetal cluster.
Allows you to centrally manage the resources associated with a baremetal cluster, such as the deployment servers, baremetal chassis, and L2 networks.
Deployment Server Allows you to specify an independent server as the deployment server to provide PXE services and console proxies for baremetal chassis.
Allows you to manage the lifecycle of deployment servers, such as creating, enabling, disabling, reconnecting, and deleting deployment servers.
Allows you to attach/detach baremetal clusters to/from a deployment server.
Baremetal Chassis Allows you to create baremetal instances based on baremetal chassis, which can be uniquely identified by their BMC interfaces and IPMI configurations.
Supports two types of addition: manual addition and template import. You can add up to 500 baremetal chassis at a time.
Allows you to manage the lifecycle of baremetal chassis, such as adding, enabling, disabling, powering on, powering off, rebooting, and deleting baremetal chassis.
Allows you to automatically or manually obtain the hardware information of a baremetal chassis.
Allows you to launch the console of a baremetal chassis and jump to its IPMI management page.
Allows you to view the hardware information list of a baremetal chassis.
Preconfigured Template Generates preconfigured files quickly to realize the unattended deployment of the operating systems for baremetal instances in bulk.
Divides preconfigured templates into system templates and custom templates based on how the preconfigured template is created.
System templates are automatically generated by the system, which contain the basic system variables and apply to simple unattended deployment scenarios.
Custom templates are generated from the uploaded custom template files (in the UTF8 format), allowing you to customize the variables other than the system variables, and applying to complex unattended deployment scenarios.
Supports the following operating systems: ZStack Cloud customized OSs, mainstream Linux OSs (RHEL/CentOS series, Debian/Ubuntu series, and SUSE/openSUSE series), and other OSs.
Supports the following types of template: kickstart (applies to ZStack Cloud customized OSs, and RHEL/CentOS OSs), preseed (applies to Debian/Ubunyu OSs), and autoyast (applies to SUSE/openSUSE OSs).
Allows you to manage the lifecycle of custom templates, such as adding, enabling, disabling, and deleting custom templates.
Allows you to download a preconfigured template.
Allows you to view the details of a preconfigured template.
Baremetal Instance Created based on baremetal chassis as vitual instances of the baremetal chassis. You can add up to 50 baremetal instances at a time.
Allows you to select images (in the ISO format and are not Live CDs) to deploy operating systems for baremetal instances.
Allows you to realize the unattended OS deployment for baremetal instances in bulk with the preconfigured files generated from the preconfigured templates.
Allows you to configure business networks for a baremetal instance; supports the following networks: flat networks and public networks; supports following network devices: NICs and NIC bonds.
Allows you to manage the lifecycle of baremetal instances, such as creating, starting, stopping, rebooting, deleting, recovering, and expunging baremetal instances.
Allows you to customize tags for baremetal instances so that you can locate them quickly.
Supports internal monitoring: displays the baremetal instance data such as CPU, memory, disk I/O, disk size, and NIC I/O. An agent is required for the internal monitoring.
Allows you to centrally view the resources associated with a baremetal instance, such as NICs and disks.
Audit Audits all of the baremetal management actions, which effectively ensure the security of the cloud environment.

Features in Elastic Baremetal Management

Resource Description
Provision Network A provision network is a dedicated network for PXE boot and image downloads while creating elastic baremetal instances.
Elastic Baremetal Cluster An elastic baremetal cluster consists of elastic baremetal instances. You can manage elastic baremetal instances by managing an elastic baremetal cluster where the instances reside.
Gateway Node A gateway node is a node where the ingress and egress traffic of the Cloud and elastic baremetal instances is forwarded.
Baremetal Node A baremetal node is used to create a baremetal instance and is identified based on the BMC interface and IPMI configuration setting.
Elastic Baremetal Instance Offering An elastic baremetal offering defines the number of vCPU cores, memory size, CPU architecture, CPU model, and other configuration settings of elastic baremetal instances.
Elastic Baremetal Instance An elastic baremetal instance has the same performance as physical servers and allows elastic scaling. You can apply for and scale resources based on your needs.

Features in Hybrid Cloud Management

Type Features Description
Data Center Alibaba Cloud Region Management Allows you to add, delete, and view regions.
Alibaba Cloud Zone Management Allows you to add, delete, and view zones.
ECS ECS Instance An elastic compute server (ECS) instance is a VM instance created on Alibaba Cloud.
Disk A disk provides storage space for an ECS instance created on Alibaba Cloud.
Image An image is a template file that is used to create ECS instances. Images are categorized into custom images and Alibaba Cloud images.
Security Group A security group provides security control services for ECS instances on the L3 network layer. It filters the inbound or outbound packets of ECS instances based on specified security rules.
VPC A virtual private cloud (VPC) is a private network used for ECS instances created on Alibaba Cloud.
EIP An elastic IP address (EIP) is an IP address in Alibaba Cloud public networks. You can attach EIPs to ECS instances so the ECS instances can access public networks by using the EIPs.
Alibaba Cloud NAS Alibaba Cloud NAS Alibaba Cloud NAS is a network-attached file storage service. It provides highly reliable and available distributed file systems that can be accessed by using standard file access protocols. In addition, Alibaba Cloud NAS is scalable in storage space and performance and can be managed in a namespace while shared with multiple users.
File System A file system is a backend storage system used for Alibaba Cloud NAS primary storage. Before you add an Alibaba Cloud primary storage, you need to add an NAS file system.
Permission Group A permission group is an allowlist mechanism that Alibaba Cloud provides for IP addresses or ranges. ECS instances of specific IP addresses or in specific IP ranges are granted access to file systems based on specified permission rules.
Network VPN Gateway A virtual private network (VPN) gateway establishes a secure connection between a local data center and Alibaba Cloud VPC by using an encrypted channel.
VPN Customer Gateway A VPN customer gateway provides services for a local data center.
Express Connect Express Connect uses physical connections (electric cables or optical fibers leased from operators) to connect local data centers with Alibaba Cloud access points and Alibaba Cloud VPCs. This way, private networks on the Cloud and in local data centers can communicate with each other in a fast, stable, and secure manner.
VPN Connection A VPN connection is an encrypted communication channel established between a VPN gateway and VPN customer gateway.
Other AccessKey Management An AccessKey pair is an identity credential that has access to APIs of Alibaba Cloud or Private Alibaba Cloud. It has full access to the Cloud. An AccessKey pair consists of AccessKey ID and AccessKey secret.

Back to Top

Download

Already filled the basic info?Click here.

Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

An email with a verification code will be sent to you. Make sure the address you provided is valid and correct.

Download

Not filled the basic info yet? Click here.

Invalid email address or mobile number.

Email Us

contact@zstack.io
ZStack Training and Certification
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

Email Us

contact@zstack.io
Request Trial
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

Email Us

contact@zstack.io

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder. After receiving the email, click the URL to download the documentation.

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder.
Or click on the URL below. (For Internet Explorer, right-click the URL and save it.)

Thank you for using ZStack products and services.

Submit successfully.

We'll connect soon.

Thank you for using ZStack products and services.