Virtualização de Processamento - Cloud Computing

Virtualização de Processamento - Cloud Computing

Introduction to Processing Virtualization

Overview of Cloud Computing and Processing Virtualization

  • The course focuses on cloud computing, specifically discussing processing virtualization and its significance in the cloud environment.
  • Initially, processing was done using hardware tailored for specific problems, leading to a variety of computer types with unique programs.

Evolution of Processing Models

  • Early devices like Bluetooth phones and electronic injectors required specific hardware; they could not interchangeably solve different problems.
  • The introduction of memory allowed computers to run various programs based on user needs, enabling flexibility in task execution.

Role of Operating Systems

  • An intermediary layer called the operating system (OS) was developed to abstract hardware differences, allowing applications to run without needing to adapt for each hardware type.
  • Operating systems operate in two modes: user mode (limited commands for application tasks) and supervisor mode (full control over hardware).

Advancements in Operating Systems

Multi-tasking Capabilities

  • Modern operating systems can handle multiple applications simultaneously, distributing resources effectively among them.
  • This capability is evident in contemporary devices where users expect multiple windows and applications running concurrently.

Emergence of Virtualization

  • The question arose about running multiple operating systems simultaneously; this led to the development of virtualization technologies.
  • Hypervisors emerged as software that enables multiple operating systems to run on a single physical machine by creating virtual machines.

Understanding Hypervisors

Types of Hypervisors

  • Each virtual machine operates independently with its own OS and applications; this process is known as virtualization.
  • To support this model, CPU operation modes expanded from two levels (user/supervisor mode) to four levels for better resource management.

Functionality and Structure

  • Hypervisors function at a higher privilege level than guest operating systems, managing their execution while interacting directly with the host's hardware.
  • Current virtualization models are categorized into Type 1 hypervisors (bare-metal), which interact directly with physical hardware rather than through an OS layer.

Current Trends in Data Centers

Utilization of Virtual Machines

  • Type 1 hypervisors have become prevalent in data centers due to their efficiency in managing resources across numerous virtual machines.

Virtualization and Cloud Services Overview

Understanding Virtual Machine Images

  • A virtual machine's state can be stored in a file known as an image, which contains all memory content, application data, and system files.
  • Images are crucial for backup recovery; they allow restoration of a virtual machine's functionality on another host after a failure or disaster.
  • Common practice involves creating an image before hardware upgrades to seamlessly transfer the operating system and applications to new hardware.

Server Consolidation through Virtualization

  • Virtualization enables server consolidation, allowing multiple servers (e.g., database, email, web servers) to run on a single physical machine.
  • This approach addresses security concerns since databases require higher security than public-facing web servers while managing performance across multiple services.
  • By consolidating numerous underutilized servers into fewer machines using virtualization, organizations can improve efficiency and resource management.

Practical Application of Cloud Services

  • Virtual machines can be offered as services by cloud providers; users can create instances via cloud service consoles like AWS EC2.
  • The process begins with selecting an instance type from pre-configured images provided by the cloud service provider.

Steps to Create a Virtual Instance

  • Users navigate the console to select the desired service (e.g., EC2), where they can manage their virtual instances effectively.
  • Creating an instance involves several steps: choosing an image, configuring instance details such as type and number of instances.

Instance Configuration Details

  • Users select from various pre-tested images available in AWS; options include Amazon Linux among others that qualify for free tier usage.
  • After selecting an image, users choose the instance type based on processor families suitable for their needs (e.g., T2 family).

Finalizing Instance Setup

  • During configuration, users specify how many instances to launch simultaneously and whether they need public IP addresses for accessibility.

Configuration of Virtual Machines

Storage Configuration

  • The process begins with configuring storage, specifically an 8GB HD, which can be upgraded to SSD if desired.
  • Tags are introduced as a way to label instances for better organization; examples include "marketing" or location-based tags like "Brasília."

Instance Naming and Tagging

  • The speaker names the instance "Ucrânia," emphasizing the importance of naming conventions for clarity and documentation purposes.
  • There are no significant limits on tagging instances, making it a low-cost method for organizing resources.

Security Group Configuration

  • Moving to security groups, these define external access services; SSH is highlighted as a primary protocol for machine connection.
  • Details about the instance's configuration are reviewed, including processor type and security group information.

Key Management

  • Users have the option to create or use existing encryption keys for secure access; this step is crucial for maintaining data integrity.
  • A warning is issued regarding the importance of keeping track of encryption keys, as losing them will result in inaccessible data.

Instance Launch and Connection

  • Once initiated, the virtual machine's status changes from pending to running, indicating successful creation and startup.
  • The public IP address (54.82.56.82) is provided for internet connectivity; users can connect via SSH using this address.

Accessing the Virtual Machine

  • Instructions are given on how to connect using SSH with specified user credentials; this highlights practical steps in accessing cloud resources.
  • Upon connection, confirmation of successful login into a Linux environment is achieved, showcasing operational capabilities.

Conclusion on Virtualization Importance

  • The session concludes by discussing virtualization's role in cloud computing and its significance in modern IT infrastructure management.