• Tidak ada hasil yang ditemukan

ba52681299d711ec80fbfa163eae5130 HCIA Cloud%20Service%20V3.0%20Lab%20Guide

N/A
N/A
az za

Academic year: 2023

Membagikan "ba52681299d711ec80fbfa163eae5130 HCIA Cloud%20Service%20V3.0%20Lab%20Guide"

Copied!
236
0
0

Teks penuh

Unless otherwise specified in the contract, all statements, information and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. This document is intended for candidates taking the HCIA-Cloud Service exam or technical personnel who want to understand the basics of cloud computing and how to use, manage and maintain HUAWEI CLOUD products. The HCIA-Cloud Service certification covers the basic knowledge of IaaS, PaaS and SaaS, including the operation and use of HUAWEI CLOUD cloud.

Passing the HCIA-Cloud Service certification proves that you have some understanding of HUAWEI CLOUD products and technologies, and you can independently use HUAWEI CLOUD products. Companies with engineers who have passed HCIA-Cloud Service certification have mastered the scenarios and use of various HUAWEI CLOUD products, facilitating their cloud transformation in the ICT environment. This document is intended for those preparing for the HCIA-Cloud Service exam or those who want to learn about how to use, manage, and maintain cloud services.

This document includes exercises in HUAWEI CLOUD operations, exercises in computing, networking, storage and O&M services, and comprehensive exercises. The exercises include registering a HUAWEI CLOUD account, logging into the console, configuring IAM, and purchasing, testing, and releasing cloud services.

Introduction

About This Exercise

Objectives

Tasks

  • Roadmap
  • Registering Your HUAWEI CLOUD Account
  • Creating an IAM User and Assigning Permissions
  • Creating and Configuring a VPC

To share resources in your HUAWEI CLOUD account without giving your account and password to others, create an IAM user and assign user permissions to specific resources. Tenant Name or HUAWEI CLOUD Account Name: The name of the HUAWEI CLOUD account that you have registered and verified. Next, we create and configure a virtual private cloud (VPC) and verify that the IAM user has permissions to use the resources.

Figure 1-3 Registering a HUAWEI CLOUD account
Figure 1-3 Registering a HUAWEI CLOUD account

Exercises

Introduction

About This Exercise

Objectives

Tasks

Roadmap

ECS Lifecycle Management

The key pair file is used to obtain the password that allows you to log in to the ECS. After confirming the ECS configurations, select I have read and agree to the Service Level Agreement and Image Disclaimer and click Submit. After about 10 seconds, you can view the created ECS on the Elastic Cloud Server page.

If Press Ctrl+Alt+Delete to login appears, click Submit CtrlAltDel at the top of the remote login page. Therefore, you cannot use remote login tools (SSH tool) to login to ECS. You can select remote login in the line containing ecs-linux and click Login to login to ECS using VNC.

If the Stop ECS page appears, select Force stop previous ECSs and click Yes. Go to the Elastic Cloud Server page and you will see that the ECS status has changed.

Figure 2-3 Choosing AP-Singapore
Figure 2-3 Choosing AP-Singapore

Creating a Windows System Disk Image from an ECS

Select the applications that Windows Firewall allows for Remote Desktop based on your network requirements and click OK. Go to Start > Control Panel > Programs and Features to check if Cloudbase-Init is installed on ECS. If Cloudbase-Init is not installed on an ECS, custom information cannot be entered into new ECSs created from a private image.

You will only be able to log into the ECS with the password indicated in the image. For an ECS created from a public image, Cloudbase-Init is installed on it by default. For an ECS created using an external image file, you must install Cloudbase-Init for ECS before using it to create a private image.

In this tutorial, ECS is created from a windows 2012 R2 public image that has Cloudbase-Init installed by default. In the Replicate Image dialog box that appears, enter a new name for the image and click OK.

Figure 2-36 Network and Sharing Center  3.  Click a network connection, for example, Ethernet 2
Figure 2-36 Network and Sharing Center 3. Click a network connection, for example, Ethernet 2

Creating a Linux System Disk Image from an ECS

Note: To ensure that you can reset the passwords of new ECSs created from a private image, we recommend that you install the One-Click Password Reset plugin (CloudResetPwdAgent) on the ECS used to create the image. That's why the One Click Password Reset plugin is installed by default. Note: To prevent NIC names from moving on new ECSs created from a private image, you must delete the ECS network policy files used to create the image.

An ECS created using an external image file may have network rule files, delete the files by following the instructions given in Deleting files from the Network Rules Directory.

Figure 2-64 Opening the NIC configuration file
Figure 2-64 Opening the NIC configuration file

AS Operations

Deleting Resources

Exercises

Introduction

About This Exercise

Objectives

Tasks

Roadmap

Creating VPCs

Buying ECSs

Verifying Network Service Functions

You can create a general compute ECS with c3.large.2 flavor, 2 vCPU and 4GB memory in LA-Santiago and AF-Johannesburg regions. If you want to log in to ECS with an EIP connection using a remote login tool, we recommend using a key pair instead of a password for security. If you access ECS through the management console, you can use a password again.

The following steps describe how to use a key pair to log into ECS. On the ECS List tab page, locate the row containing ecs-S02 and click Connect in the Operation column. If the health check result is Unhealthy, either the security group rules have not been configured to allow traffic to and from the backdoor, or the health check configuration is incorrect.

In the left navigation pane, select Access Control > Security Groups, find the security group that contains the two ECSs, and add security group rules. In the following figure, you can see the SERVER1 file we created earlier, indicating that ecs-S01 is the one being accessed. Set Destination to the CIDR block of VPC-S02, Next Hop Type to VPC peering connection and Next Hop to Peering-vivi.

Set Destination to CIDR block VPC-S01, Next Hop Type to VPC peering connection and Next Hop to Peering-viva. The ping is successful, which means ECSs from different VPCs in the same region can communicate with each other over a parallel VPC connection. Security groups associated with ECS in a VPC allow traffic to and from your on-premises data center.

Remote Gateway: Enter the IP address and replace it with the IP address of the VPN gateway you will create in the LA-Santiago region. Go to the VPN connections page, find the vpn-Johannesburg VPN connection and select More > Change in the Operation column.

Figure 3-17 Remotely logging in to the ECS
Figure 3-17 Remotely logging in to the ECS

Deleting Resources

In the service list, choose Elastic Volume Service under Storage to go to the Elastic Volume Service page. In the Initialize Disk window, select the target disk, click MBR (Master Boot Record) or GPT (GUID Partition Table), and then click OK. Choose Snapshots from the left navigation panel, locate the volume Linux data snapshot, and click Create Disk in the Operation column.

Note that the information in the red box is the domain name of the file system. This file is created in the ECS ecs-linux file system, which means that the SFS file system can be shared between servers. In the CTS console, select Key Event Notifications in the navigation pane and click Create Key Event Notification in the upper right corner.

On the Cloud Eye Server Monitoring page, find ecs-linux and click Create Alarm Rule in the Operation column. In the LTS console, select Log Management in the navigation pane and click Create Log Group in the upper left corner.

Exercises

EVS

Introduction

With data redundancy and cache acceleration techniques, EVS drives provide high availability and durability, as well as stable and low latency. You can initialize EVS disks, create file systems on them, and store data permanently on them.

Tasks

After the system disk is detached from a server, the disk function changes to Bootable disk and the disk status changes to Available. The status of the disk is attached, which indicates that the disk is being attached to the server. Once a data disk is attached to an ECS, you must log in to the ECS and initialize the disk before using it.

Before unmounting an EVS disk on the console, you must log in to ECS and unmount the disk. To verify that data on a detached EVS disk is still usable, we will detach the disk and then attach it to another ECS for verification. When you purchase the disk, select the AZ where the Linux ECS is located for the disk.).

OBS

Introduction

Tasks

In the Basic Information area, move the cursor next to Versioning to see its status. Enter a URL validity period in the Share File dialog box and copy the link for sharing.

Deleting Resources

SFS

Introduction

Tasks

If information similar to the previous figure is returned, the NFS software package is installed. Log in to the SFS console, click on the file system to be mounted, and view the mount address. If information similar to the following is displayed, IP addresses have been mapped to the file system domain name.

Now that the file system is mounted on ECS and can be used. Note that nolock sfs-nas01.ap-southeast-2a.myhuaweicloud.com:/share-c343b993 is the mount address obtained from the SFS console.

Deleting Resources

Connect the object store on Windows ECS using OBS Browser+ and configure synchronization policy to implement scheduled file synchronization. Verify that automount has been configured in /etc/fstab, then create an ECS from the private image and check if the filesystem can be automounted on the new ECS and if files can be shared. Find ecs-linux in the ECS list and select More > Restart in the Operation column.

Exercises

Introduction

About This Exercise

Objectives

Tasks

Configuring CTS Key Event Notifications

The generated CTS tracker identifies and connects to all cloud services you use.

Performing a key operation in VPC and verifying CTS functions

Use Cloud Eye to Monitor an ECS

You can flexibly configure alarm rules and notifications on Cloud Eye to track resource status and performance updates and prevent potential service losses.

Viewing ECS Logs

Deleting Resources

Exercises

Background

Solution

Preparations

Logging In to HUAWEI CLOUD

Creating a VPC

Creating and Configuring a Security Group

Buying an ECS

Buying an RDS DB Instance

Creating a Shared Load Balancer

Creating an Image

Configuring AS

Visiting the Website

Monitoring Resources

Deleting Resources

Deleting ECSs

Deleting the RDS DB Instance

Deleting the Image

Deleting the Load Balancer

Deleting AS Resources

Deleting VPC Resources

Gambar

Figure 1-16 Creating a user
Figure 1-21 Clicking IAM User
Figure 1-25 Choosing Virtual Private Cloud
Figure 1-28 Deleting the subnet
+7

Referensi

Dokumen terkait

In the first section of the page, as shown in Figure 8-10, select how you want the Google custom search box to appear on your page and then click the Save Changes

Figure 7 Agarose gel electrophoresis of amplified genomic DNA with micosatellite marker named FH94 and FH102.: Lane 1; 100 base-pair ladder size standard, Lanes 2-5 and 7-10; genomic