Resource overview
Describes resource types in KSV.
Resources are entity objects required for running workloads in KubeSphere Virtualization (KSV) clusters. Each time you perform an operation to create an object, the corresponding resources are generated. This includes nodes, VMs, and networks. In KSV, resources are categorized into two types: physical resources and virtual resources. Physical resources are infrastructure devices, such as server nodes, physical networks, and storage devices. Virtual resources exist at the logical level. These resources are easy to use and can be obtained by virtualizing physical resources. Virtual resources include virtual private clouds (VPCs), VMs, disks, and snapshots.
This topic describes resource types in KSV.
Physical resources
The following table lists the types of common physical resources in KSV.
Resource type | Description |
---|---|
Physical nodes | Infrastructure servers in KSV. You can create VMs on physical nodes. KSV provides the following node types:
|
Physical CPUs | CPUs that are installed on physical nodes. |
CPU cores | Chips on physical CPUs for data processing. |
Memory | Memory provided by the memory cards on physical nodes. |
Physical disks | Physical disks on storage devices. |
Physical subnets | Unit of a physical network. A physical network can be divided into multiple subnets. |
Virtual resources
The following table lists the types of common virtual resources in KSV.
Resource type | Description |
---|---|
Projects | Objects that help you manage resources by group. You can assign users to projects and specify their roles in the projects to implement role-based access control. |
VMs | Virtual machines that are created on cluster nodes and can run business workloads. |
VM templates | Primary copies of VMs. Each template contains the specific configuration of a VM. |
Images | Standard delivery format of VMs. The configuration and dependencies of VMs can be encapsulated into images. |
Virtual disks | Block-level virtual storage resources for VMs. Each virtual disk exists on its server in the form of a folder. |
Elastic IP addresses (EIPs) | Independent public IP addresses that enable Internet access. |
VPCs | Private cloud networks. VPCs are logically isolated from each other. |
Virtual subnets | CIDR blocks in VPCs. |
SSH keys | Key pairs that are generated based on encryption algorithms. Each SSH key contains a pair of public and private keys. |
Security groups | Virtual firewalls that are used to control inbound and outbound traffic of associated resources. |