Security


HTTPS-encrypted UI Login

The system supports HTTPS access to the management UI for enhanced security.
  • HTTPS is disabled by default.
  • When HTTPS is enabled, the system uses port 5443 by default and supports configuration of custom ports for access.
  • After enabling HTTPS, accessing the UI via HTTP on port 5000 will be automatically redirected to HTTPS. Currently, only automatic redirection from HTTP port 5000 is supported.
  • The system supports PKCS12 format certificates by default. Currently, only PKCS12 and JKS format certificates are supported. If you are using certificates in other formats, convert them to a supported format.

VM Instance Console

The VM instance console provides users with a streamlined entry point for monitoring and managing VM instances. You must have appropriate permissions to access the VM console. Two authentication methods are supported for console login: SSH key authentication and username/password.
  • SSH Key Authentication
    • You can use SSH key authentication to log in to Linux VM instances.
    • An SSH key is a pair of cryptographic keys generated by an algorithm: a public key, which is shared openly, and a private key, which is kept secure by the user.
    • After a public key is attached to a VM instance, you can use the corresponding private key to SSH into the VM instance from another VM instance without requiring a password.
    • To attach a public key during the VM instance creation, ensure that the VM image has cloud-init pre-installed. The recommended cloud-init versions are 0.7.9, 17.1, 19.4, or later.
    • To attach a public key after the VM instance creation, ensure that the VM instance is running and has QEMU Guest Agent (QGA) installed and running. You can install QGA by installing the GuestTool. If you install QGA by using other methods, install version 2.5 or later.
  • Username/Password
    • You can log into VM instances using a username and password.
    • The fixed username for Linux VM instances is root, and the fixed username for Windows VM instances is administrator.
    • After a password is injected into a VM instance, you can use the username or password to SSH into the VM instance from another VM instance.
    • Ensure that the VM image has cloud-init pre-installed. The recommended cloud-init versions are 0.7.9, 17.1, 19.4, or later.

High Availability

VM Instance HA

VM instances support the high availability (HA) mode. This policy can trigger automatic VM restart when a VM is stopped due to routine maintenance (planned) or unexpected failures (unplanned), thereby improving VM availability.

NeverStop VM HA Mechanism:
  • The system uses polling and trigger-based mechanisms to monitor the VM instance status. If the VM instance is confirmed to be stopped, a VM configured with HA will be automatically restarted.
  • The system uses polling and trigger-based mechanisms to monitor the VM instance status. If the VM status cannot be definitively determined, the following detection process is initiated:
    1. Based on the existing network configuration, select the most accurate method to probe the status of the host where the VM instance resides.
    2. If the status of the host is abnormal, the HA-enabled VM instance will attempt to restart automatically.

Load Balancing

Multiple VM instances can use the load balancing service to form a cluster, eliminating single points of failure and improving application availability.









Archives

Download Document Archives

Download

Already filled the basic info?Click here.

Enter at least 2 characters.
Cannot be empty.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

An email with a verification code will be sent to you. Make sure the address you provided is valid and correct.

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Download

Not filled the basic info yet? Click here.

Invalid email address or mobile number.
同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
ZStack Training and Certification
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
Request Trial
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder. After receiving the email, click the URL to download the documentation.

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder.
Or click on the URL below. (For Internet Explorer, right-click the URL and save it.)

Thank you for using ZStack products and services.

Submit successfully.

We'll connect soon.

Thank you for using ZStack products and services.