Advantages
Consistent User Experience
Offer a consistent user experience comparable to leading international virtualization vendors. No changes to your existing deployment methods or operations workflows. With just five simple steps, you can rapidly create virtual machines, achieving cost-effective application transformation.
Baremetal Management
Unify the management of both virtual machines and baremetal servers, providing applications with a more flexible, efficient, and reliable runtime environment.
Self-Developed
Achieve an almost 100% self-developed code rate, demonstrating our commitment to innovation and intellectual property ownership.
Full Compatibility
Compatible with four architectures and eight types of platform environments, demonstrating its exceptional interoperability and reliability.
Backup Services
Provide comprehensive backup and recovery functionality, supporting various local and cross-regional backup scenarios to ensure the security and reliability of backup data.
400+ Case Studies
Cover over 10 key industries and sectors including government, telecommunications, finance, education, energy, transportation, healthcare, and manufacturing.
Overview
ZStack ZSphere boasts high autonomy, stability, performance, and security. Sharing the same core engine with the ZStack Cloud, it supports four major architectures and eight distinct platform environments. Aligned with the enterprise-level virtualization capabilities of leading international virtualization vendors, it ensures a consistent and seamless user experience. It enables intelligent unified O&M, smooth and seamless migrations, and guarantees business safety and reliability. Furthermore, it facilitates effortless one-click upgrades to the cloud, streamlining the transition process.
Features
High Autonomy Rate
From the underlying code and engine to the product design and solution implementation
Code-Level:
Achieve nearly 100% self-developed code rate.
Engine-Level:
Compatible with four major architectures and eight distinct platform environments.
Product-Level:
Built-in cryptography module enables one-stop compliance with commercial cryptography application security assessment.
Solution-Level:
Offer a comprehensive solution for Level 3 Information System Security Protection, fully addressing compliance requirements.
High Stability
Power failure self-recovery, data loss prevention, and continuous uptime
Architecture:
Full plugin architecture, in-process microservices, redundant databases, and metadata consistency.
Mechanism:
Features a robust self-healing mechanism that includes management service High Availability (HA), network HA, virtual machine HA, virtual machine fault detection, and business fault detection, ensuring automatic recovery from failures and maintaining system uptime.
Testing:
Passed rigorous testing with over 100,000 test cases, including 1,000 hours of automated testing per release; underwent monthly stress tests with 4,500 instances of violent power-off, thoroughly testing the product's stability and reliability.
Practice:
Proven stable operation for over 60,000 hours, supporting enterprise-level production applications, including financial-grade core transaction systems.
High Performance
Comprehensive optimization of computing, storage, and networking, supporting the efficient operation of various high-performance workloads
High Computing Performance:
High Computing Performance: Jointly with Kunpeng and Kylin, achieved top scores in the international standard SPEC Cloud performance test under equivalent deployment conditions.
Leverages message bus technology to support high concurrency, processing tens of thousands of API requests per second, creating 100 virtual machines in 40 seconds, and 2,000 virtual machines in 15 minutes.
High Storage Performance:
Features the proprietary Shared Block storage technology, which optimizes SAN and NVMe-oF storage with less than 5% performance overhead, achieving millions of IOPS for virtual machine storage
vhost solutions enable compatibility with general vhost storage, increasing performance by an average of 70%.
High Network Performance:
Through OVS-DPDK optimization, achieves a 6x performance improvement compared to Linux Bridge.
Through SR-IOV optimization, achieves a 60x performance improvement compared to Linux Bridge.
Virtual Load Balancing: Meets the standards of leading international products in the same category.
High Unification
Unified Management of IT Resources: Support diverse devices, leverages existing infrastructure, and ensures effective investment protection
Unified Computing:
Compatible with multiple CPU architectures, support the reuse of multi-brand servers, protecting investments.
Unified Storage:
Offer comprehensive support for multiple protocols, including local storage (LocalStorage), block storage (iSCSI/FC/RBD), and file storage (NFS/GPFS/ShareMountPoint).
Unified Network:
Support multiple networking configurations, offering both Soft SDN and Hard SDN capabilities.
Unified PCIe Devices:
Offer comprehensive support for passthrough and virtualization of PCIe devices, including GPUs, DPUs, FPGAs, and others, efficiently supporting LLMs and big data applications.
High Security
Safeguard user operations and ensures business continuity through a four-level security framework.
Network Security:
Network traffic access control with distributed firewalls and security groups, filtering north-south and east-west network traffic.
Business Security:
Virtualized antivirus protection with a non-agent-based virtualization security engine that promptly detects and removes security threats.
System Security:
Conduct comprehensive vulnerability scans using commercial tools, timely patches vulnerabilities to reduce the risk of attacks, and minimizes the cost of post-incident remediation.
Data and Account Security:
Commercial data encryption and identity authentication, supporting the effective use of commercial cryptography to build a secure password barrier for the network.
High Intelligence
Multiple Smart Components: Reduce business failure rates, enhance operational efficiency, and improve satisfaction.
Intelligent O&M Alarm:
Customizable alarm metrics for various events and resources.
Virtual Resource Topology:
Provide a clear view of the number and interconnections of resources within the data center.
Enhanced SNMP Management:
Comprehensive SNMP management with a proprietary MIB library.
Smart Script Library:
Manage a vast collection of scripts in a unified manner.
Use Cases
Core Production Environment
Testing and General Business
Independent Disaster Recovery Environment
Commercial Cryptography
Support the efficient and stable operation of applications and databases
Hyper-Converged Infrastructure:
Deployed using an all-flash hyper-converged architecture, connected to distributed storage via vhost to ensure low latency, and utilizes a three-replica storage mechanism to guarantee stability.
Baremetal Architecture:
Deploy high-performance workloads that cannot be virtualized, ensuring stability while providing performance equivalent to physical machines. It also leverages the convenient management and rapid maintenance capabilities of the virtualization platform.
Storage and Compute Separation Architecture:
Use FC-SAN or NVMe over RoCE for the integration between the virtualization platform and centralized storage, providing high I/O throughput and low latency for core business systems.
信创虚拟化替代,助力建设符合信创要求国产化业务架构
需求背景:
在信创改造的过程中,虚拟化平台有着向下对接硬件设备,向上承载业务应用。故而在当下数据中心建设过程中,应该立足当下需求,着眼未来演变,选择符合信创发展的基础信息平台
解决方案:
立足自研架构,拥有虚拟化平台完整的技术资料、知识产权及源代码,虚拟化平台升级不受制于其他技术壁垒,从芯到虚拟化拥抱生态:适配国内主流芯片及操作系统,全面支持信创中间件、数据库、安全、备份容灾、应用软件等,打造从芯到虚拟化的全部安全、可信的云生态
方案价值:
四架构八平台,全自研架构云平台能力,配合丰富的上下游生态适配,助力建设符合信创要求国产化业务架构
Leverage existing equipment to its fullest extent
Challenges and Requirements:
Testing and business cluster deployment requires moderate resources, with lower computing and memory requirements. There is a need for higher cost-effectiveness and minimal overhead at the infrastructure level.
Solution:
Deploy a virtualization platform system directly through a hyper-converged appliance or by repurposing existing servers. Provide virtual machine management, monitoring, allocation, and usage functions to business applications. Offer static resource allocation and dynamic scheduling management capabilities.
Application Value:
Maximize the utilization of existing equipment, revitalizing assets; achieves better cost-effectiveness and lower TCO through hyper-converged deployment; reduces underlying resource consumption, preventing waste.
Ensure business continuity by providing a separate disaster recovery environment
Solution:
Establish an application-level disaster recovery data center. In the event of a main data center failure, global load balancing is used to switch between the primary and secondary data centers. Critical systems utilize distributed storage extension clusters or active-active centralized storage modes for host-level disaster recovery, achieving RPO=0 and RTO≈3 minutes. Other system data is protected through backup and business resumption software, achieving RPO=0 and RTO≈10 minutes for continuous disaster recovery.
Solution Advantages:
Utilize the built-in disaster recovery features of the platform to roll back logical errors, ensuring protection against data loss due to human error or system failures. Through distributed storage extension clusters or dual-active centralized storage, establish a data center-level dual-active solution, helping users set up geographically dispersed disaster recovery for business systems and achieving dual-active operation for core systems in different locations.
Meet information security and compliance requirements
Identity Authentication:
Invoke the virtualized server cryptographic device to provide identity authentication services, ensuring the authenticity of system login users.
Access Control and Information Integrity: Invokes the virtualized server cryptographic device to provide integrity verification services, ensuring the integrity of access control information and the completeness of security labels for important information resources.
Data Transmission Confidentiality and Integrity:
Invoke the virtualized server cryptographic device to provide encryption services for data transmission, ensuring the confidentiality and integrity of important data transmitted by the system.
400+ Case Studies, Serving Over 3,000 Enterprise-Level Clients

Back to Top

Download

Already filled the basic info?Click here.

Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

An email with a verification code will be sent to you. Make sure the address you provided is valid and correct.

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Download

Not filled the basic info yet? Click here.

Invalid email address or mobile number.
同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
ZStack Training and Certification
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
Request Trial
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder. After receiving the email, click the URL to download the documentation.

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder.
Or click on the URL below. (For Internet Explorer, right-click the URL and save it.)

Thank you for using ZStack products and services.

Submit successfully.

We'll connect soon.

Thank you for using ZStack products and services.