Virtualização de Processamento - Cloud Computing
Introduction to Processing Virtualization
Overview of Cloud Computing and Processing Virtualization
- The course focuses on cloud computing, specifically discussing processing virtualization and its significance in the cloud environment.
- Initially, processing was done using hardware tailored for specific problems, leading to a variety of computer types with unique programs.
Evolution of Processing Models
- Early devices like Bluetooth phones and electronic injectors required specific hardware; they could not interchangeably solve different problems.
- The introduction of memory allowed computers to run various programs based on user needs, enabling flexibility in task execution.
Role of Operating Systems
- An intermediary layer called the operating system (OS) was developed to abstract hardware differences, allowing applications to run without needing to adapt for each hardware type.
- Operating systems operate in two modes: user mode (limited commands for application tasks) and supervisor mode (full control over hardware).
Advancements in Operating Systems
Multi-tasking Capabilities
- Modern operating systems can handle multiple applications simultaneously, distributing resources effectively among them.
- This capability is evident in contemporary devices where users expect multiple windows and applications running concurrently.
Emergence of Virtualization
- The question arose about running multiple operating systems simultaneously; this led to the development of virtualization technologies.
- Hypervisors emerged as software that enables multiple operating systems to run on a single physical machine by creating virtual machines.
Understanding Hypervisors
Types of Hypervisors
- Each virtual machine operates independently with its own OS and applications; this process is known as virtualization.
- To support this model, CPU operation modes expanded from two levels (user/supervisor mode) to four levels for better resource management.
Functionality and Structure
- Hypervisors function at a higher privilege level than guest operating systems, managing their execution while interacting directly with the host's hardware.
- Current virtualization models are categorized into Type 1 hypervisors (bare-metal), which interact directly with physical hardware rather than through an OS layer.
Current Trends in Data Centers
Utilization of Virtual Machines
- Type 1 hypervisors have become prevalent in data centers due to their efficiency in managing resources across numerous virtual machines.
Virtualization and Cloud Services Overview
Understanding Virtual Machine Images
- A virtual machine's state can be stored in a file known as an image, which contains all memory content, application data, and system files.
- Images are crucial for backup recovery; they allow restoration of a virtual machine's functionality on another host after a failure or disaster.
- Common practice involves creating an image before hardware upgrades to seamlessly transfer the operating system and applications to new hardware.
Server Consolidation through Virtualization
- Virtualization enables server consolidation, allowing multiple servers (e.g., database, email, web servers) to run on a single physical machine.
- This approach addresses security concerns since databases require higher security than public-facing web servers while managing performance across multiple services.
- By consolidating numerous underutilized servers into fewer machines using virtualization, organizations can improve efficiency and resource management.
Practical Application of Cloud Services
- Virtual machines can be offered as services by cloud providers; users can create instances via cloud service consoles like AWS EC2.
- The process begins with selecting an instance type from pre-configured images provided by the cloud service provider.
Steps to Create a Virtual Instance
- Users navigate the console to select the desired service (e.g., EC2), where they can manage their virtual instances effectively.
- Creating an instance involves several steps: choosing an image, configuring instance details such as type and number of instances.
Instance Configuration Details
- Users select from various pre-tested images available in AWS; options include Amazon Linux among others that qualify for free tier usage.
- After selecting an image, users choose the instance type based on processor families suitable for their needs (e.g., T2 family).
Finalizing Instance Setup
- During configuration, users specify how many instances to launch simultaneously and whether they need public IP addresses for accessibility.
Configuration of Virtual Machines
Storage Configuration
- The process begins with configuring storage, specifically an 8GB HD, which can be upgraded to SSD if desired.
- Tags are introduced as a way to label instances for better organization; examples include "marketing" or location-based tags like "Brasília."
Instance Naming and Tagging
- The speaker names the instance "Ucrânia," emphasizing the importance of naming conventions for clarity and documentation purposes.
- There are no significant limits on tagging instances, making it a low-cost method for organizing resources.
Security Group Configuration
- Moving to security groups, these define external access services; SSH is highlighted as a primary protocol for machine connection.
- Details about the instance's configuration are reviewed, including processor type and security group information.
Key Management
- Users have the option to create or use existing encryption keys for secure access; this step is crucial for maintaining data integrity.
- A warning is issued regarding the importance of keeping track of encryption keys, as losing them will result in inaccessible data.
Instance Launch and Connection
- Once initiated, the virtual machine's status changes from pending to running, indicating successful creation and startup.
- The public IP address (54.82.56.82) is provided for internet connectivity; users can connect via SSH using this address.
Accessing the Virtual Machine
- Instructions are given on how to connect using SSH with specified user credentials; this highlights practical steps in accessing cloud resources.
- Upon connection, confirmation of successful login into a Linux environment is achieved, showcasing operational capabilities.
Conclusion on Virtualization Importance
- The session concludes by discussing virtualization's role in cloud computing and its significance in modern IT infrastructure management.