Huawei DCS and Guest OS Windows Server 2022 Compatibility Test Report
Axians Global
All Rights Reserved
1.Overview
1.1 Objective
The objective of this testing report is to test the compatibility between FusionCompute and guest OS.
1.2 Scenario
The test covers the basic functions, reliability, and maintainability of the guest OS.
2.Environment Configuration
2.1 Networking Diagrams for Verification
Table 2-1 Networking diagram for verifying functions
The Windows and Linux hosts are deployed on the Host Server.
2.2 Hardware and Software Configurations
2.2.1 Hardare Configuration
Table 2-1 Hardware configuration
Name | Description | Quantity | Function |
---|---|---|---|
Host server | x86 server
| 2 | Install FusionCompute and deploy test VMs on FusionCompute. |
10GE switch | CE6800 | 1 | Specifies the network plane on which hosts communicate with storage units on storage devices. |
Management switch | GE switch | 1 | Specifies the plane used by the management system to manage all nodes in a unified manner. |
2.2.2 Test Software and Tools
Table 2-2 Test software and tools
Software | Description | Quantity |
---|---|---|
FusionCompute 8.7.0 | FC virtualization platform | 1 |
Windows Server 2022 | VM OS, Tested guest OS | 1 |
GPU Card Test Kit | To test the basic functions of the GPU card. | 1 |
SSH client software | SSH terminal connection tool. | 1 |
3.Test Cases
3.1 Guest OS Installation
3.1.1 Installing a Guest OS Image in BIOS Mode
Objective | Verify that a guest OS image can be successfully installed in BIOS mode. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. |
Procedure | 1. Create a VM. In the navigation pane of FusionCompute, choose Resource Pool > Create VM. On the displayed page, set OS Type and OS Version to the type and version of the OS to be tested, respectively. In the Configure VM step, click the Options tab and set Boot Firmware to BIOS. (Expected result 1) |
Expected Result | 1. When you select the corresponding OS type, the OS to be tested is contained in the OS Version drop-down list. The VM is successfully created. |
Test Result | 1. Create a VM. In the navigation pane of FusionCompute, choose Resource Pool > Create VM. On the displayed page, set OS Type and OS Version to the type and version of the OS to be tested, respectively. In the Configure VM step, click the Options tab and set Boot Firmware to BIOS. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.1.2 Installing a Guest OS Image in UEFI Mode
Objective | Verify that a guest OS image can be successfully installed in UEFI mode. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. |
Procedure | 1. Create a VM. In the navigation pane of FusionCompute, choose Resource Pool > Create VM. On the displayed page, set OS Type and OS Version to the type and version of the OS to be tested, respectively. In the Configure VM step, click the Options tab and set Boot Firmware to UEFI. |
Expected Result | 1. When you select the corresponding OS type, the OS to be tested is contained in the OS Version drop-down list. The VM is successfully created. |
Test Result | 1. Create a VM. In the navigation pane of FusionCompute, choose Resource Pool > Create VM. On the displayed page, set OS Type and OS Version to the type and version of the OS to be tested, respectively. In the Configure VM step, click the Options tab and set Boot Firmware to UEFI. |
Conclusion | Passed |
Remarks |
3.2 VMTools Installation, Upgrade, and Uninstallation
3.2.1 Installing VMTools
Objective | Verify that VMTools can be successfully installed on a VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. |
Procedure | 1. Start the VM whose boot firmware is BIOS, right-click the VM, and choose Tools > Mount Tools from the shortcut menu. For details about how to install Tools, see Operation and Maintenance > Service Management > Virtual Machine Management > Tools Management > Installing Tools in the FusionCompute Product Documentation. (Expected result 1) |
Expected Result | 1. VMTools is installed successfully. |
Test Result | 1. Start the VM whose boot firmware is BIOS, right-click the VM, and choose Tools > Mount Tools from the shortcut menu. For details about how to install Tools, see Operation and Maintenance > Service Management > Virtual Machine Management > Tools Management > Installing Tools in the FusionCompute Product Documentation. (Expected result 1) 2. Start the VM whose boot firmware is BIOS, and configure the IP address, mask, and gateway for the VM. (Expected result 2) 3. Start the VM whose boot firmware is BIOS, select the VM, and view the VM information on the Monitoring tab page. (Expected result 3) 4. Start the VM whose boot firmware is UEFI, right-click the VM, and choose Tools > Mount Tools from the shortcut menu. For details about how to install Tools, see Operation and Maintenance > Service Management > Virtual Machine Management > Tools Management > Installing Tools in the FusionCompute Product Documentation. (Expected result 1) 5. Start the VM whose boot firmware is UEFI, and configure the IP address, mask, and gateway for the VM. (Expected result 2) 6. Start the VM whose boot firmware is UEFI, select the VM, and view the VM information on the Monitoring tab page. (Expected result 3) |
Conclusion | Passed |
Remarks |
3.2.2 Upgrading and Uninstalling VMTools
Objective | Verify that VMTools can be successfully upgraded and uninstalled. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A guest OS VM to be tested has been created. |
Procedure | 1. Install VMTools of an earlier version on the VM. (Expected result 1) |
Expected Result | 1. VMTools of an earlier version is successfully installed. |
Test Result | 1. Install VMTools of an earlier version on the VM. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.3 VM Lifecycle Management
3.3.1 Importing or Exporting a VM Template, Converting a VM to a Template, and Cloning a VM
Objective | Verify that a VM template can be imported and exported, a VM can be converted to a template, and a VM can be cloned. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. |
Procedure | 1. Right-click the VM, which is in the stopped state and choose Template > Convert to Template. (Expected result 1) |
Expected Result | 1. The VM is successfully converted to a template. |
Test Result | 1. Right-click the VM, which is in the stopped state and choose Template > Convert to Template. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.3.2 Testing the VM Power Supply
Objective | Verify that the VM power supply is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. |
Procedure | 1. Right-click the VM, choose Power, and select an option. Repeat the operations to start, forcibly restart, stop, and forcibly stop the VM in sequence. After the VM is stopped or forcibly stopped, start the VM. (Expected result 1) |
Expected Result | 1. The VM is restarted and forcibly restarted successfully. After the VM is stopped or forcibly stopped, the VM is started successfully. |
Test Result | 1. Right-click the VM, choose Power, and select an option. Repeat the operations to start, forcibly restart, stop, and forcibly stop the VM in sequence. After the VM is stopped or forcibly stopped, start the VM. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.3.3 Testing the VM Live Migration Function
Objective | Verify that the VM live migration function is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. |
Procedure | 1. In the address box of a local browser, enter http://VRM floating IP address to log in to FusionCompute. (Expected result 1) |
Expected Result | 1. The login to FusionCompute is successful. |
Test Result | 1. In the address box of a local browser, enter http://VRM floating IP address to log in to FusionCompute. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.3.4 Deleting a VM
Objective | Verify that a VM can be deleted. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. |
Procedure | 1. Right-click the VM and choose Delete > Delete. (Expected result 1) |
Expected Result | 1. The VM is deleted successfully. |
Test Result | 1. Right-click the VM and choose Delete > Delete. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.4 Disk Hot Swap
3.4.1 Attaching a Disk Whose Bus Type Is SCSI to or Detaching It from a Running VM
Objective | Verify that a disk whose bus type is SCSI can be attached to or detached from a running VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed and the system is running properly. You can log in to FusionCompute successfully. 2. You have logged in to FusionCompute and a corresponding datastore is available. 3. A VM with a normal OS is running properly. |
Procedure | 1. Select the VM, which is in the running state, choose Configuration > Hardware > Disk > Attach Disk. On the displayed page, click Create and Attach Disk, set Bus Type to SCSI, select the created disk, and click OK. (Expected result 1) 2. Select the VM and choose Configuration > Disk to view the disk information. (Expected result 2) 3. Log in to the VM, run the lsblk command to query the newly added disk, format the disk, and mount the disk to the specified directory. Then, create files on the disk, modify the files, and delete the files from the disk. (Expected result 3) 4. Select the disk attached to the VM in step 1 and expand the VM disk capacity. (Expected result 4) 5. After expanding the VM disk capacity and formatting the disk, perform read and write operations on the disk. (Expected result 5) 6. Select the VM, which is in the running state, choose Configuration > Hardware > Disk, select the disk created in step 1, and choose More > Detach. Note: For some OSs, you may need to shut down the VM before detaching the disk. (Expected result 6) 7. Log in to the VM and run the lsblk command to query the disk information. (Expected result 7) |
Expected Result | 1. The disk is successfully attached to the VM. 2. Information about the newly attached disk is displayed on the disk page. 3. Files can be created on the disk, modified, and deleted from the disk. 4. The disk capacity is expanded successfully. 5. The read and write operations on the disk after capacity expansion are normal. 6. No information about the detached disk is displayed on the disk page. 7. No information about the detached disk is displayed in the command output. |
Test Result | 1. Select the VM, which is in the running state, choose Configuration > Hardware > Disk > Attach Disk. On the displayed page, click Create and Attach Disk, set Bus Type to SCSI, select the created disk, and click OK. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.4.2 Attaching a Disk Whose Bus Type Is VIRTIO to or Detaching It from a Running VM
Objective | Verify that a disk whose bus type is VIRTIO can be attached to or detached from a running VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed and the system is running properly. You can log in to FusionCompute successfully. 2. You have logged in to FusionCompute and a corresponding datastore is available. 3. A VM with a normal OS is running properly. |
Procedure | 1. Select the VM, which is in the running state, choose Configuration > Hardware > Disk > Attach Disk. On the displayed page, click Create and Attach Disk, set Bus Type to VIRTIO, select the created disk, and click OK. (Expected result 1) 2. Select the VM and choose Configuration > Disk to view the disk information. (Expected result 2) 3. Log in to the VM, run the lsblk command to query the newly added disk, format the disk, and mount the disk to the specified directory. Then, create, modify, and delete files on the new disk. (Expected result 3) 4. Select the VM, which is in the running state, choose Configuration > Hardware > Disk, select the disk created in step 1, and choose More > Detach. Note: For some OSs, you may need to shut down the VM before detaching the disk. (Expected result 4) 5. Log in to the VM and run the lsblk command to query the disk information. (Expected result 5) |
Expected Result | 1. The disk is successfully attached to the VM. 2. Information about the newly attached disk is displayed on the disk page. 3. Files can be created on the disk, modified, and deleted from the disk. 4. No information about the detached disk is displayed on the disk page. 5. No information about the detached disk is displayed in the command output. |
Test Result | 1. Select the VM, which is in the running state, choose Configuration > Hardware > Disk > Attach Disk. On the displayed page, click Create and Attach Disk, set Bus Type to VIRTIO, select the created disk, and click OK. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.5 VM NIC Operations
3.5.1 Adding a NIC to or Deleting It from a Running VM
Objective | Verify that a NIC can be added to or deleted from a running VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. 2. A distributed virtual switch (DVS) has been created on FusionCompute, and a port group has been added to the DVS. 3. A DHCP server has been configured on the network for the newly added NIC to automatically obtain an IP address. Otherwise, you need to manually configure the IP address of the new NIC. |
Procedure | 1. Select the VM, which is in the running state, choose Configuration > Hardware > NIC > Add NIC, select a port group under common network connection, and click OK. Run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 1) 2. Configure the IP address and mask of the new NIC through DHCP or manual configuration. (Expected result 2) 3. Select the VM, which is in the running state, choose Configuration > Hardware > NIC > Operation > Delete NIC, and run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 3) |
Expected Result | 1. The NIC is successfully added to the VM, and the new NIC information can be queried. 2. After the IP address is configured successfully, the IP address can be pinged locally. 3. The NIC is deleted successfully, and the deleted NIC cannot be queried on the VM. |
Test Result | 1. Select the VM, which is in the running state, choose Configuration > Hardware > NIC > Add NIC, select a port group under common network connection, and click OK. Run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.5.2 Testing the PCI Passthrough NIC of a VM
Objective | Verify that the PCI passthrough NIC of a VM is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. 2. A NIC that supports PCI passthrough is available on the server. 3. A DHCP server has been configured on the network for the newly added NIC to automatically obtain an IP address. Otherwise, you need to manually configure the IP address of the new NIC. |
Procedure | 1. Select the VM, which is in the stopped state, choose Configuration > Hardware > PCI Device > Bind PCI Device, select a NIC that supports PCI passthrough, and click OK. Start the VM and run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 1) 2. Configure the IP address and mask of the new NIC through DHCP or manual configuration. (Expected result 2) 3. Select the VM, which is in the stopped state, choose Configuration > Hardware > PCI Device, select the NIC added in step 1, unbind the NIC, and start the VM. Then, run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 3) |
Expected Result | 1. The NIC is successfully added to the VM, and the new NIC information can be queried. 2. After the IP address is configured successfully, the IP address can be pinged locally. 3. The NIC is deleted successfully, and the deleted NIC cannot be queried on the VM. |
Test Result | 1. Select the VM, which is in the stopped state, choose Configuration > Hardware > PCI Device > Bind PCI Device, select a NIC that supports PCI passthrough, and click OK. Start the VM and run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.5.3 Testing the VM NIC in SR-IOV Passthrough Mode
Objective | Verify that a VM can properly use the NIC in SR-IOV passthrough mode. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. 2. A NIC that supports SR-IOV passthrough is available on the server. 3. A DHCP server has been configured on the network for the newly added NIC to automatically obtain an IP address. Otherwise, you need to manually configure the IP address of the new NIC. |
Procedure | 1. Choose Resource Pool > Host > Configuration > Network > Physical NIC. Select the corresponding network port, for example, eth1, click Change Switch Mode to switch to the SR-IOV mode, set the number of VFs, and click OK. (Expected result 1) 2. Choose Resource Pool > Network > Create DVS. In the displayed dialog box, create a DVS named SR-IOV1, set the switch type to SR-IOV-enabled, select Add Uplinks and Add VLAN Pool, and click Next. Select the network port for which the SR-IOV mode is configured in previous step and click Next. Then, click Add, enter a VLAN range from 2 to 4094, click Next, and click OK. (Expected result 2) 3. Choose Resource Pool > Network, select SR-IOV1 created in the previous step, click the Port Groups tab, and click Add to add port group pg1. Set Port Type to Access, configure other parameters, and click Next. Set Connection Mode to VLAN, set the VLAN ID, and click Next. After confirming all information, click OK. (Expected result 3) 4. In the resource pool, locate the VM created in step 1. When the VM is stopped, click the VM name and choose Configuration > Hardware > NIC. Then, locate the NIC and choose Operation > Modify Port Group, select SR-IOV1 created in step 2 for the DVS and pg1 for the port group, and click OK. (Expected result 4) 5. Start the VM, configure the IP address and mask of the new NIC through DHCP or manual configuration, and run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 5) |
Expected Result | 1. The switch mode of the port is SR-IOV. 2. User-mode DVS SR-IOV1 is successfully created. 3. Port group pg1 is created. 4. The NIC is added successfully. 5. The new NIC is queried. After the IP address is configured successfully, the IP address can be pinged locally. |
Test Result | 1. Choose Resource Pool > Host > Configuration > Network > Physical NIC. Select the corresponding network port, for example, eth1, click Change Switch Mode to switch to the SR-IOV mode, set the number of VFs, and click OK. (Expected result 1) 2. Choose Resource Pool > Network > Create DVS. In the displayed dialog box, create a DVS named SR-IOV1, set the switch type to SR-IOV-enabled, select Add Uplinks and Add VLAN Pool, and click Next. Select the network port for which the SR-IOV mode is configured in previous step and click Next. Then, click Add, enter a VLAN range from 2 to 4094, click Next, and click OK. (Expected result 2) 3. Choose Resource Pool > Network, select SR-IOV1 created in the previous step, click the Port Groups tab, and click Add to add port group pg1. Set Port Type to Access, configure other parameters, and click Next. Set Connection Mode to VLAN, set the VLAN ID, and click Next. After confirming all information, click OK. (Expected result 3) 4. In the resource pool, locate the VM created in step 1. When the VM is stopped, click the VM name and choose Configuration > Hardware > NIC. Then, locate the NIC and choose Operation > Modify Port Group, select SR-IOV1 created in step 2 for the DVS and pg1 for the port group, and click OK. (Expected result 4) 5. Start the VM, configure the IP address and mask of the new NIC through DHCP or manual configuration, and run the ifconfig –a/ip link show command to view the VM NIC information. (Expected result 5) |
Conclusion | Passed |
Remarks |
3.5.4 Testing the Network Configuration of the VM NICs
Objective | Verify that the network configuration of the VM NICs is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. 2. A DVS has been created on FusionCompute, and a port group has been added to the DVS. 3. The DHCP server has been configured on the network for the newly added NICs to automatically obtain the IP addresses. Otherwise, you need to manually configure the IP addresses of the new NICs. 4. Only one gateway is configured for multiple NICs. Otherwise, a conflict occurs and an error is reported on the page. |
Procedure | 1. Add two NICs to the VM. 2. Configure a static IPv4 address for the first NIC. (Expected result 1) 3. Configure a static IPv6 address for the second NIC. (Expected result 2) |
Expected Result | 1. The static IPv4 address is configured successfully, and the static IPv4 gateway can be pinged from the VM. 2. The static IPv6 address and dynamic IPv6 routing are successfully configured. The static IPv6 gateway can be pinged from the VM. |
Test Result | 1. Add two NICs to the VM. 2. Configure a static IPv4 address for the first NIC. (Expected result 1) 3. Configure a static IPv6 address for the second NIC. (Expected result 2) |
Conclusion | Passed |
Remarks |
3.6 Adding CPU and Memory to a VM
3.6.1 Adjusting the CPU and Memory Specifications of a Running VM
Objective | Verify that the CPU and memory specifications of a running VM can be adjusted. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A VM has been created and is running properly. 3. In FusionCompute 8.3.0 and later versions, x86 servers support online CPU and memory expansion. In FusionCompute 8.5.0 and later versions, Arm servers support online CPU and memory expansion. Note: The CPU and memory configurations take effect without the need to reset the VM. |
Procedure | 1. Select the VM, choose Configuration > Hardware, and set the CPU and memory parameters to larger values. 2. Refresh the FusionCompute page. Select the VM and choose Configuration > Hardware > CPU and Configuration > Hardware > Memory to view the specifications after adjustment. 3. Log in to the VM using VNC, and run the cat /proc/cpuinfo |more and free –h commands to view the CPU and memory information, respectively. |
Expected Result | 1. The CPU and memory parameters are successfully set to larger values. 2. The CPU and memory parameters after expansion are displayed. 3. The VM OS is running properly. The CPU and memory information displayed in the background is the same as that on the FusionCompute page. |
Test Result | 1. Select the VM, choose Configuration > Hardware, and set the CPU and memory parameters to larger values. 2. Refresh the FusionCompute page. Select the VM and choose Configuration > Hardware > CPU and Configuration > Hardware > Memory to view the specifications after adjustment. 3. Log in to the VM using VNC, and run the cat /proc/cpuinfo |more and free –h commands to view the CPU and memory information, respectively. |
Conclusion | Passed |
Remarks |
3.6.2 Configuring the CPU and Memory and Restarting a VM for the Configuration to Take Effect
Objective | Verify that the CPU and memory configuration takes effect after a VM is restarted. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A VM has been created and is running properly. 3. In FusionCompute 8.3.0 and later versions, x86 servers support online CPU and memory expansion. In FusionCompute 8.5.0 and later versions, Arm servers support online CPU and memory expansion. Note: This test case is executed only when the test in section 2.7.1 fails. |
Procedure | 1. Select the VM, choose Configuration > Hardware, set the CPU and memory parameters to larger values, and reset the VM. 2. Refresh the FusionCompute page. Select the VM and choose Configuration > Hardware > CPU and Configuration > Hardware > Memory to view the specifications after adjustment. 3. Log in to the VM using VNC, and run the cat /proc/cpuinfo |more and free –h commands to view the CPU and memory information, respectively. 4. Select the VM, choose Configuration > Hardware, set the CPU and memory parameters to smaller values, and reset the VM. 5. Refresh the FusionCompute page. Select the VM and choose Configuration > Hardware > CPU and Configuration > Hardware > Memory to view the specifications after adjustment. 6. Log in to the VM using VNC, and run the cat /proc/cpuinfo |more and free –h commands to view the CPU and memory information, respectively. |
Expected Result | 1. The CPU and memory parameters are successfully set to larger values. 2. The CPU and memory parameters after expansion are displayed. 3. The VM OS is running properly. The CPU and memory information displayed in the background is the same as that on the FusionCompute page. 4. The CPU and memory parameters are successfully set to smaller values. 5. The CPU and memory parameters after reduction are displayed. 6. The VM OS is running properly. The CPU and memory information displayed in the background is the same as that on the FusionCompute page. |
Test Result | 1. Select the VM, choose Configuration > Hardware, set the CPU and memory parameters to larger values, and reset the VM. 2. Refresh the FusionCompute page. Select the VM and choose Configuration > Hardware > CPU and Configuration > Hardware > Memory to view the specifications after adjustment. 3. Log in to the VM using VNC, and run the cat /proc/cpuinfo |more and free –h commands to view the CPU and memory information, respectively. 4. Select the VM, choose Configuration > Hardware, set the CPU and memory parameters to smaller values, and reset the VM. 5. Refresh the FusionCompute page. Select the VM and choose Configuration > Hardware > CPU and Configuration > Hardware > Memory to view the specifications after adjustment. 6. Log in to the VM using VNC, and run the cat /proc/cpuinfo |more and free –h commands to view the CPU and memory information, respectively. |
Conclusion | Passed |
Remarks |
3.7 VM Clock Policy
3.7.1 Testing the VM Clock Synchronization
Objective | Verify that the VM clock synchronization is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. 2. The free clock function is enabled on the VM. |
Procedure | 1. Simulate a situation in which the VM time is different from the host time. 2. Select the VM, which is in the stopped state, choose Configuration > Management > Advanced > Clock Synchronization Policy > Settings. In the displayed dialog box, select Synchronize with host clock, and click OK. Then, start the VM. (Expected result 1) 3. Log in to the VM and check the VM time and host time. (Expected result 2) |
Expected Result | 1. Clock synchronization is configured successfully. 2. The VM time is the same as the host time. |
Test Result | 1. Simulate a situation in which the VM time is different from the host time. Host time: Vm time: 2. Select the VM, which is in the stopped state, choose Configuration > Management > Advanced > Clock Synchronization Policy > Settings. In the displayed dialog box, select Synchronize with host clock, and click OK. Then, start the VM. (Expected result 1) 3. Log in to the VM and check the VM time and host time. (Expected result 2) Host time: Vm time: |
Conclusion | Passed |
Remarks |
3.7.2 Testing the Free Clock Function of the VM
Objective | Verify that the free clock function of the VM is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. 2. Clock synchronization is enabled on the VM, and the host time is consistent with the VM time. |
Procedure | 1. Select the VM, which is in the stopped state, choose Configuration > Management > Advanced > Clock Synchronization Policy > Settings. In the displayed dialog box, deselect Synchronize with host clock, and click OK. Then, start the VM. (Expected result 1) 2. Log in to the VM and change the VM time to make the time difference between the VM and the host is 8 hours. (Expected result 2) 3. Log in to the host using SSH and run the /sbin/hwclock –systohc command to set the free time persistence. (Expected result 3) 4. Restart the VM and check the time on the VM. (Expected result 4) |
Expected Result | 1. The free clock is configured successfully. 2. The VM time is changed successfully. The time difference between the VM and the host is 8 hours. 3. The free time persistence is set successfully. 4. The time difference between the VM and the host is 8 hours. |
Test Result | 1. Select the VM, which is in the stopped state, choose Configuration > Management > Advanced > Clock Synchronization Policy > Settings. In the displayed dialog box, deselect Synchronize with host clock, and click OK. Then, start the VM. (Expected result 1) 2. Log in to the VM and change the VM time to make the time difference between the VM and the host is 8 hours. (Expected result 2) Host time: Vm time: 3. Log in to the host using SSH and run the /sbin/hwclock –systohc command to set the free time persistence. (Expected result 3) 4. Restart the VM and check the time on the VM. (Expected result 4) Host time: Vm time: |
Conclusion | Passed |
Remarks |
3.8 Windows OS Customization
3.8.1 Customizing the Computer Name, Password, and NIC (Automatically Obtaining an IPv4 Address)
Objective | Verify that the computer name, password, and NIC (automatically obtaining an IPv4 address) can be customized. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. 3. An IPv4 DHCP server has been configured on the network where the VM resides. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv4, IP Address Obtaining Mode to Automatically obtain IP address, and DNS Obtaining Mode to Automatically obtain DNS server address. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv4 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv4 address configured for the VM from the local host. (Expected result 6) |
Expected Result | 1. The customized attributes are correctly configured. 2. The customized NIC configuration is normal, and the VM is successfully deployed using the template. 3. You can use the customized password to log in to the OS. 4. The computer name is the customized name. 5. The customized NIC information is the same as the customized configuration, and the IPv4 address can be pinged locally. 6. The customized information is not lost, and the IPv4 address can be pinged locally. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv4, IP Address Obtaining Mode to Automatically obtain IP address, and DNS Obtaining Mode to Automatically obtain DNS server address. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv4 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv4 address configured for the VM from the local host. (Expected result 6) |
Conclusion | Passed |
Remarks |
3.8.2 Customizing the Computer Name, Password, and NIC (with the Specified IPv4 Address and Default Gateway)
Objective | Verify that the computer name, password, and NIC (with the specified IPv4 address and default gateway) can be customized. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP type to IPv4, and configure the IP address, subnet mask, default gateway, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv4 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv4 address configured for the VM from the local host. (Expected result 6) |
Expected Result | 1. The customized attributes are correctly configured. 2. The customized NIC configuration is normal, and the VM is successfully deployed using the template. 3. You can use the customized password to log in to the OS. 4. The computer name is the customized name. 5. The customized NIC information is the same as the customized configuration, and the IPv4 address can be pinged locally. 6. The customized information is not lost, and the IPv4 address can be pinged locally. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP type to IPv4, and configure the IP address, subnet mask, default gateway, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv4 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv4 address configured for the VM from the local host. (Expected result 6) |
Conclusion | Passed |
Remarks |
3.8.3 Customizing the Computer Name, Password, and NIC (with Specified IPv4 Address and IPv4 Route Information)
Objective | Verify that the computer name, password, and NIC (with the specified IPv4 address and IPv4 route information) can be customized. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP type to IPv4, configure the IP address and subnet mask, enable IPv4 route information, and configure the IPv4 route gateway, IPv4 destination network, IPv4 destination network mask, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the gateway address of the destination network from the VM. (Expected result 5) 6. Restart the VM and view the customized information (configurations in steps 2 and 3). Ping the gateway address of the destination network from the VM. (Expected result 6) |
Expected Result | 1. The customized attributes are correctly configured. 2. The customized NIC configuration is normal, and the VM is successfully deployed using the template. 3. You can use the customized password to log in to the OS. 4. The computer name is the customized name. 5. The customized NIC information is the same as the customized configuration. The VM can ping the gateway address of the destination network. 6. The customized information is not lost, and the VM can ping the gateway address of the destination network. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP type to IPv4, configure the IP address and subnet mask, enable IPv4 route information, and configure the IPv4 route gateway, IPv4 destination network, IPv4 destination network mask, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the gateway address of the destination network from the VM. (Expected result 5) 6. Restart the VM and view the customized information (configurations in steps 2 and 3). Ping the gateway address of the destination network from the VM. (Expected result 6) |
Conclusion | Passed |
Remarks |
3.8.4 Customizing the Computer Name, Password, and NIC (Automatically Obtaining an IPv6 Address Through DHCP)
Objective | Verify that the computer name, password, and NIC (automatically obtaining an IPv6 address through DHCP) can be customized. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. 3. An IPv6 DHCP server has been configured on the network where the VM resides. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv6, IP Address Obtaining Mode to Use DHCP service to automatically obtain IPv6 address, and DNS Obtaining Mode to Automatically obtain DNS server address. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv6 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv6 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv6 address configured for the VM from the local host. (Expected result 6) |
Expected Result | 1. The customized attributes are correctly configured. 2. The customized NIC configuration is normal, and the VM is successfully deployed using the template. 3. You can use the customized password to log in to the OS. 4. The computer name is the customized name. 5. The customized NIC information is the same as the customized configuration, and the IPv6 address can be pinged locally. 6. The customized information is not lost, and the IPv6 address can be pinged locally. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv6, IP Address Obtaining Mode to Use DHCP service to automatically obtain IPv6 address, and DNS Obtaining Mode to Automatically obtain DNS server address. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv6 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv6 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv6 address configured for the VM from the local host. (Expected result 6) |
Conclusion | Passed |
Remarks |
3.8.5 Customizing the Computer Name, Password, and NIC (Automatically Obtaining an IPv6 Address by Router Advertisement)
Objective | Verify that the computer name, password, and NIC (automatically obtaining an IPv6 address by router advertisement) can be customized. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. Before converting the VM to a template, run the cat /etc/resolv.conf command to check whether the DNS address is automatically obtained. If so, delete the automatically-obtained address from the resolv.conf file. (If the DNS address is not deleted, the accuracy of the automatically-obtained DNS address will be affected during template deployment.) 3. The IPv6 route advertisement service has been configured on the network where the VM resides. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv6, IP Address Obtaining Mode to Use router advertisement function to automatically obtain IPv6 address, and DNS Obtaining Mode to Automatically obtain DNS server address. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv4 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv6 address configured for the VM from the local host. (Expected result 6) |
Expected Result | 1. The customized attributes are correctly configured. 2. The customized NIC configuration is normal, and the VM is successfully deployed using the template. 3. You can use the customized password to log in to the OS. 4. The computer name is the customized name. 5. The customized NIC information is the same as the customized configuration. The IPv6 address obtained through route advertisement is of the global type, and the IPv6 address can be pinged locally. 6. The customized information is not lost, and the IPv6 address can be pinged locally. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv6, IP Address Obtaining Mode to Use router advertisement function to automatically obtain IPv6 address, and DNS Obtaining Mode to Automatically obtain DNS server address. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the IPv4 address configured for the VM from the local host. (Expected result 5) 6. Restart the VM, view the customized information (configurations in steps 2 and 3), and ping the IPv6 address configured for the VM from the local host. (Expected result 6) |
Conclusion | Passed |
Remarks |
3.8.6 Customizing the Computer Name, Password, and NIC (with Specified IPv6 Address)
Objective | Verify that the computer name, password, and NIC (with the specified IPv6 address) can be customized. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. Before converting the VM to a template, run the cat /etc/resolv.conf command to check whether the DNS address is automatically obtained. If so, delete the automatically-obtained address from the resolv.conf file. (If the DNS address is not deleted, the accuracy of the automatically-obtained DNS address during template deployment will be affected.) |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv6 and IP Address Obtaining Mode to Use static IPv6 address, and enter the IP address and subnet prefix length. Enable IPv6 route information, configure the IPv6 route gateway, IPv6 destination network, and IPv6 destination network prefix length, and set the primary and secondary DNS server addresses. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the gateway address of the destination network from the VM. (Expected result 5) 6. Restart the VM and view the customized information (configurations in steps 2 and 3). Ping the gateway address of the destination network from the VM. (Expected result 6) |
Expected Result | 1. The customized attributes are correctly configured. 2. The customized NIC configuration is normal, and the VM is successfully deployed using the template. 3. You can use the customized password to log in to the OS. 4. The computer name is the customized name. 5. The customized NIC information is the same as the customized configuration. The VM can ping the gateway address of the destination network. 6. The customized information is not lost, and the VM can ping the gateway address of the destination network. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP Type to IPv6 and IP Address Obtaining Mode to Use static IPv6 address, and enter the IP address and subnet prefix length. Enable IPv6 route information, configure the IPv6 route gateway, IPv6 destination network, and IPv6 destination network prefix length, and set the primary and secondary DNS server addresses. (Expected result 2) 3. Log in to the VM using VNC and enter the existing administrator username as well as the customized password as an administrator to log in to the VM. (Expected result 3) 4. Run the hostname command to view the customized computer name. (Expected result 4) 5. Check the customized NIC information as follows: Open the cmd tool and run the ipconfig /all command to check the IPv4 address, mask, and DNS configuration of the VM. Run the route print command to check the gateway. Ping the gateway address of the destination network from the VM. (Expected result 5) 6. Restart the VM and view the customized information (configurations in steps 2 and 3). Ping the gateway address of the destination network from the VM. (Expected result 6) |
Conclusion | Passed |
Remarks |
3.8.7 Generating an Initial Password When Customization Is Not Used
Objective | Verify that the initial password can be generated when customization is not used. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template from the shortcut menu. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS step, select Do not customize and select Generate Initial Password. (Expected result 1) 2. After the VM is started, select the VM, click the Summary tab to view the initial system password. Then, use the password to log in to the VM. (Expected result 2) 3. View the NIC configuration information (IP address, mask, gateway, and DNS server) of the VM. (Expected result 3) 4. Ping the IPv4 address of the VM from the local host. (Expected result 4) |
Expected Result | 1. The VM is successfully deployed using the template. 2. You can log in to the OS using the initial password. 3. The customized NIC information is the same as that in the original template, and the IP address can be pinged locally. 4. The IP address can be pinged locally. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template from the shortcut menu. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS step, select Do not customize and select Generate Initial Password. (Expected result 1) 2. After the VM is started, select the VM, click the Summary tab to view the initial system password. Then, use the password to log in to the VM. (Expected result 2) 3. View the NIC configuration information (IP address, mask, gateway, and DNS server) of the VM. (Expected result 3) 4. Ping the IPv4 address of the VM from the local host. (Expected result 4) |
Conclusion | Passed |
Remarks |
3.9 Snapshot
3.9.1 Creating a Storage Snapshot
Objective | Verify that a storage snapshot can be successfully created for a VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A local image file or template is available for deploying and creating a VM or importing a VM template. 3. VMTools has been installed on a VM to be tested. |
Procedure | 1. Create a VM running the guest OS to be tested. For details, see Operation and Maintenance > Service Management > Provisioning a VM > Creating a Bare VM in the FusionCompute 8.X.X Product Documentation. (Expected result 1) 2. Right-click the VM to be tested and choose Create Snapshot from the shortcut menu to create a common snapshot (deselect Memory snapshot and Consistency snapshot). (Expected result 2) 3. Create a file on the VM, select the VM and click the Snapshot tab, select the snapshot created in step 2, and restore the VM using the snapshot. (Expected result 3) |
Expected Result | 1. The VM is created successfully. 2. The common snapshot is successfully created for the VM. 3. The VM is successfully restored using the snapshot, but the created file is lost. |
Test Result | 1. Create a VM running the guest OS to be tested. For details, see Operation and Maintenance > Service Management > Provisioning a VM > Creating a Bare VM in the FusionCompute 8.X.X Product Documentation. (Expected result 1) 2. Right-click the VM to be tested and choose Create Snapshot from the shortcut menu to create a common snapshot (deselect Memory snapshot and Consistency snapshot). (Expected result 2) 3. Create a file on the VM, select the VM and click the Snapshot tab, select the snapshot created in step 2, and restore the VM using the snapshot. (Expected result 3) restore the VM: |
Conclusion | Passed |
Remarks |
3.9.2 Creating a Memory Snapshot
Objective | Verify that a memory snapshot can be successfully created for a VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A local image file or template is available for deploying and creating a VM or importing a VM template. 3. VMTools has been installed on a VM to be tested. 4. In FusionCompute 8.5.0 and later versions, Linux VMs of the Arm architecture support memory snapshots. |
Procedure | 1. Create a VM running the guest OS to be tested. For details, see Operation and Maintenance > Service Management > Provisioning a VM > Creating a Bare VM in the FusionCompute 8.X.X Product Documentation. (Expected result 1) 2. Create a file on the VM and open the file. (Expected result 2) 3. Right-click the VM to be tested and choose Create Snapshot from the shortcut menu to create a memory snapshot (select Memory snapshot but deselect Consistency snapshot). (Expected result 3) 4. Close the file in step 2, select the VM and click the Snapshot tab, select the snapshot created in step 3, and restore the VM using the snapshot. (Expected result 4) |
Expected Result | 1. The VM is created successfully. 2. The file is opened. 3. A memory snapshot is successfully created for the VM. 4. The VM is successfully restored using the snapshot, and the file in step 2 is still open. |
Test Result | 1. Create a VM running the guest OS to be tested. For details, see Operation and Maintenance > Service Management > Provisioning a VM > Creating a Bare VM in the FusionCompute 8.X.X Product Documentation. (Expected result 1) 2. Create a file on the VM and open the file. (Expected result 2) 3. Right-click the VM to be tested and choose Create Snapshot from the shortcut menu to create a memory snapshot (select Memory snapshot but deselect Consistency snapshot). (Expected result 3) 4. Close the file in step 2, select the VM and click the Snapshot tab, select the snapshot created in step 3, and restore the VM using the snapshot. (Expected result 4) |
Conclusion | Passed |
Remarks |
3.9.3 Creating a Consistency Snapshot
Objective | Verify that a consistency snapshot can be successfully created for a VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A local image file or template is available for deploying and creating a VM or importing a VM template. 3. VMTools has been installed on a VM to be tested. 4. In FusionCompute 8.5.0 and later versions, Linux VMs of the x86 and Arm architecture support consistency snapshots. |
Procedure | 1. Log in to the VM and perform a write operation. 2. Right-click the tested VM and choose Create Snapshot from the shortcut menu to create a common snapshot (deselect Memory snapshot but select Consistency snapshot). 3. Create a file on the VM, select the VM and click the Snapshot tab, and restore the VM using the snapshot. |
Expected Result | 1. The write operation is not suspended. 2. The write operation is suspended during snapshot creation. After the snapshot is successfully created, the write operation is normal. 3. The VM is successfully restored using the snapshot. |
Test Result | 1. Log in to the VM and perform a write operation. 2. Right-click the tested VM and choose Create Snapshot from the shortcut menu to create a common snapshot (deselect Memory snapshot but select Consistency snapshot). 3. Create a file on the VM, select the VM and click the Snapshot tab, and restore the VM using the snapshot. restore the VM: |
Conclusion | Passed |
Remarks |
3.10 USB Passthrough
3.10.1 Verifying the USB Passthrough Function of a VM
Objective | Verify that the USB passthrough function of a VM can be used properly. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute is running properly. 2. A USB device is available on the host. 3. The VM running the OS to be tested resides on the host that contains a USB device. 4. The USB device to be attached must support USB 2.0 or USB 3.0. Hygon and Phytium servers do not support USB 2.0. |
Procedure | 1. Log in to the FusionCompute portal. On the host that contains a USB device, select the CNA host and choose Configuration > Hardware > USB Device > Bind VM, set the controller type to USB 3.0, and select the corresponding VM. 2. Log in to the VM using VNC, mount the USB device to the specified directory (if the USB device does not have a file system, partition and format the USB device first), and perform read and write operations on the USB device. 3. Select the host, choose Configuration > Hardware > USB Device, and check the allocation status, device status, and owning VM. 4. Detach the USB device from the VM and log in to the VM using VNC to check whether the USB information is displayed. 5. Select the VM, choose Configuration > Hardware > USB Device, and check the USB information. 6. Log in to the FusionCompute portal. On the host that contains a USB device, select the CNA host and choose Configuration > Hardware > USB Device > Bind VM, set the controller type to USB 2.0, and select the corresponding VM. (Expected result 1) 7. Repeat steps 2 to 5. (Expected results 2 to 5) |
Expected Result | 1. The USB device is successfully attached to the VM. 2. After logging in to the system using VNC and mounting the USB device to specific directory, you can perform read and write operations on the USB device. 3. The allocation status is allocated, the device status is passthrough, and the owning VM is the VM to which the USB device is attached. 4. The USB device is detached from the VM and cannot be viewed on the VM. 5. The USB device information is empty. |
Test Result | 1. Log in to the FusionCompute portal. On the host that contains a USB device, select the CNA host and choose Configuration > Hardware > USB Device > Bind VM, set the controller type to USB 3.0, and select the corresponding VM. 2. Log in to the VM using VNC, mount the USB device to the specified directory (if the USB device does not have a file system, partition and format the USB device first), and perform read and write operations on the USB device. 3. Select the host, choose Configuration > Hardware > USB Device, and check the allocation status, device status, and owning 4. Detach the USB device from the VM and log in to the VM using VNC to check whether the USB information is displayed. 5. Select the VM, choose Configuration > Hardware > USB Device, and check the USB information. 6. Log in to the FusionCompute portal. On the host that contains a USB device, select the CNA host and choose Configuration > Hardware > USB Device > Bind VM, set the controller type to USB 2.0, and select the corresponding VM. (Expected result 1) 7. Repeat steps 2 to 5. (Expected results 2 to 5) |
Conclusion | Passed |
Remarks |
3.11 SSD
3.11.1 Binding or Unbinding an SSD from a VM
Objective | Verify that a Solid State Disk (SSD) can be bound to or unbound from a VM. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed, and is running properly. You can log in to FusionCompute successfully. 2. An SSD card exists on the CNA host. |
Procedure | 1. Choose VM > Configuration > Management > Advanced > Bind to Host, enable Bind to Host, and select the host corresponding to the VM. 2. Choose VM > Configuration > Hardware > Memory, and set Reserved (MB) to 6144. Set Memory to 6 GB, Quota to Medium, and Hugepage Memory to Disabled. 3. Power off the VM. 4. Choose VM > Configuration > Hardware > PCI Device > Bind PCI Device to bind an SSD. 5. Start the VM to which the SSD is bound. 6. Log in to the VM using VNC, mount the SSD, and run the lsblk command to query the SSD. The SSD name is nvme0n1. After the SSD is formatted, create a file on the SSD and reset the VM. (Expected result 6) 7. Choose VM > Configuration > Hardware > PCI Device to unbind the SSD. |
Expected Result | 1. The VM is successfully bound to the host. 2. The VM memory is configured successfully. 3. The VM is powered off successfully. 4. The PCI device is bound successfully. 5. The VM is powered on, and the corresponding record is displayed in the task list. 6. Choose VM > Configuration > Hardware > PCI Device to view the bound SSD. The device type is SSD. After the VM is restarted, the file created on the SSD is not lost. 7. The SSD is unbound from the VM. The lsblk command output in the VNC background shows that the SSD is unbound from the VM. |
Test Result | 1. Choose VM > Configuration > Management > Advanced > Bind to Host, enable Bind to Host, and select the host corresponding to the VM. 2. Choose VM > Configuration > Hardware > Memory, and set Reserved (MB) to 6144. Set Memory to 6 GB, Quota to Medium, and Hugepage Memory to Disabled. 3. Power off the VM. 4. Choose VM > Configuration > Hardware > PCI Device > Bind PCI Device to bind an SSD. 5. Start the VM to which the SSD is bound. 6. Log in to the VM using VNC, mount the SSD, and run the lsblk command to query the SSD. The SSD name is nvme0n1. After the SSD is formatted, create a file on the SSD and reset the VM. (Expected result 6) 7. Choose VM > Configuration > Hardware > PCI Device to unbind the SSD. |
Conclusion | Passed |
Remarks |
3.12 GPU
3.12.1 Testing Basic GPU Functions of the Guest OS Passthrough GPU Device in the Windows System
Objective | Verify that the basic GPU functions are normal in the guest OS passthrough GPU device of the Windows system. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. NVIDIA GPUs have been installed on the server. 2. Driver requirements: NVIDIA GPUs use the GRID 13.7 driver, and other GPUs use the driver versions recommended by vendors. 3. For NVIDIA GPUs, CUDA, cuDNN, and TensorFlow have been installed on the VM, where computing scripts can be executed. 4. You have selected the VM to which the GPUs are to be bound and chosen Configuration > Hardware > Memory to set the maximum value for the reserved memory. The VM has been bound to the host. |
Procedure | 1. In the address box of a local browser, enter http://VRM floating IP address to log in to FusionCompute. (Expected result 1) |
Expected Result | 1. The login to FusionCompute is successful. |
Test Result | 1. In the address box of a local browser, enter http://VRM floating IP address to log in to FusionCompute. (Expected result 1) 2. Choose Resource Pool > GPU Resource Groups > Create GPU Resource Group, set GPU Model to the GPU corresponding to the device and GPU Allocation Method to Passthrough, and click OK. (Expected result 2) 3. Choose GPU Resource Groups > GPUs > Attach GPU and select the GPU device. (Expected result 3) 4. Power off the VM, select the VM to be tested, choose Configuration > Hardware > GPU Resource Group > Attach GPU Resource Group, and select the corresponding GPU. (Expected result 4) 5. Log in to the VM and view the GPU information. On the Windows desktop, right-click the blank area and choose NVIDIA Control Panel from the shortcut menu to view GPU information, or in the Windows desktop search bar, type Device Manager, select the corresponding option, and view the GPU model information in the Display adapters directory. (Expected result 5) 6. Run the computing script on the VM with NVIDIA GPUs. (Expected result 6) 7. Unbind a GPU: Select the VM and choose Configuration > Hardware > GPU Resource Group > Detach. (Expected result 7) |
Conclusion | Passed |
Remarks |
3.12.2 Testing the Basic vGPU Functions of the Guest OS vGPU Device in the Windows System
Objective | Verify that basic vGPU functions are normal in the guest OS vGPU device in the Windows system. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. NVIDIA GPUs have been installed on the server. 2. Driver requirements: NVIDIA GPUs use the GRID 13.7 driver, and other GPUs use the driver versions recommended by vendors. 3. For NVIDIA GPUs, CUDA, cuDNN, and TensorFlow have been installed on the VM, where computing scripts can be executed. 4. You have selected the VM to which the GPUs are to be bound and chosen Configuration > Hardware > Memory to set the maximum value for the reserved memory. The VM has been bound to the host. |
Procedure | 1. In the address box of a local browser, enter http://VRM floating IP address to log in to FusionCompute. (Expected result 1) |
Expected Result | 1. The login to FusionCompute is successful. |
Test Result | 1. In the address box of a local browser, enter http://VRM floating IP address to log in to FusionCompute. (Expected result 1) 2. Choose Resource Pool > GPU Resource Groups > Create GPU Resource Group, set GPU Model to the GPU corresponding to the device and GPU Allocation Method to Virtualization, and click OK. (Expected result 2) 3. Choose GPU Resource Groups > GPUs > Attach GPU and select the GPU device. (Expected result 3) 4. Power off the VM, select the VM to be tested, choose Configuration > Hardware > GPU Resource Group > Attach GPU Resource Group, and select the corresponding GPU. (Expected result 4) 5. Log in to the VM and view the GPU information. On the Windows desktop, right-click the blank area and choose NVIDIA Control Panel from the shortcut menu to view GPU information, or in the Windows desktop search bar, type Device Manager, select the corresponding option, and view the GPU model information in the Display adapters directory. (Expected result 5) 6. Run the computing script on the VM with NVIDIA vGPUs. (Expected result 6) 7. Unbind a GPU: Select the VM and choose Configuration > Hardware > GPU Resource Group > Detach. (Expected result 7) |
Conclusion | Passed |
Remarks |
3.13 Other Value-added Functions of the Guest OS
3.13.1 Testing NUMA Topology Adjustment
Objective | Verify that the NUMA topology adjustment is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been installed and deployed and the system is running properly. You can log in to FusionCompute successfully. 2. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. |
Procedure | 1. Select the VM to be tested, which is in the stopped state, choose Configuration > Management > Options > NUMA Topology Adjustment > Settings, enable NUMA topology adjustment, and set the adjustment mode to Auto Adjustment. (Expected result 1) |
Expected Result | 1. NUMA topology adjustment is enabled successfully. |
Test Result | 1. Select the VM to be tested, which is in the stopped state, choose Configuration > Management > Options > NUMA Topology Adjustment > Settings, enable NUMA topology adjustment, and set the adjustment mode to Auto Adjustment. (Expected result 1) 2. Select the VM, choose Configuration > Management > Advanced > NUMA Topology Adjustment > Settings, enable Generate on First Startup, and set the maximum number of CPUs per NUMA node to 2 and the minimum number of CPUs for NUMA node splitting to 1. Choose Hardware > CPU, set and the number of CPU cores to 4. (Expected result 2) 3. Start the VM and run the lscpu command to check the number of NUMA nodes on the VM. (Expected result 3) |
Conclusion | Passed |
Remarks |
3.13.2 Testing the I/O Suspension Function
Objective | Verify that the I/O suspension function is normal. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. FusionCompute has been connected to SAN storage, and the VM to be tested has been deployed on SAN storage. 2. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. |
Procedure | 1. Select a VM, which is in the stopped state, choose Configuration > Management > Advanced > Policy Delay > Settings and set the customized delay time to 14400 minutes. (Expected result 1) |
Expected Result | 1. The policy delay is configured successfully. |
Test Result | 1. Select a VM, which is in the stopped state, choose Configuration > Management > Advanced > Policy Delay > Settings and set the customized delay time to 14400 minutes. (Expected result 1) 2. Add a SAN storage disk to the VM, format the disk and mount it to the specified directory, and create a test file test.txt. Run the dd command to write data to the file, for example, dd if=/dev/vdb of=./test.txt bs=8k count=300000. (Expected result 2) 3. Simulate a scenario where the storage link is disconnected. For example, log in to the storage device, delete the initiator (iSCSI) from the host corresponding to the VM, and check the VM status. (Expected result 3) 4. Restore the storage link: Add the initiator in step 3 and choose Resource Pool > Storage > Storage Devices > Scan on the FusionCompute page. (Expected result 4) |
Conclusion | Passed |
Remarks |
3.14 Guest OS Basic Reliability Test
3.14.1 Testing the Customized IPv4 Configuration After the VM Is Repeatedly Reset
Objective | Verify that the customized IPv4 configuration is normal after the VM is repeatedly reset. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. Before converting the VM to a template, run the cat /etc/resolv.conf command to check whether the DNS address is automatically obtained. If so, delete the automatically-obtained address from the resolv.conf file. (If the DNS address is not deleted, the accuracy of the automatically-obtained DNS address will be affected during template deployment.) 3. An IPv4 DHCP server has been configured on the network where the VM resides. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) |
Expected Result | 1. The customized attributes are correctly configured. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure Computer Name and Administrator Password, and set the Network resource management type to Workgroup and Network resource management name to workgroup name. (Expected result 1) 2. Customize NIC settings, set IP type to IPv4, configure the IP address and subnet mask, enable IPv4 route information, and configure the IPv4 route gateway, IPv4 destination network, IPv4 destination network mask, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). (Expected result 2) 3. Forcibly reset the VM for three times. After each VM startup, check whether the customized information in steps 1 and 2 is lost or changed. (Expected result 3) First time: Second time: Third time: |
Conclusion | Passed |
Remarks |
3.14.2 Testing the Customized IPv6 Configuration After the VM Is Repeatedly Reset
Objective | Verify that the customized IPv6 configuration is normal after the VM is repeatedly reset. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. Before converting the VM to a template, run the cat /etc/resolv.conf command to check whether the DNS address is automatically-obtained. If so, delete the automatically-obtained address from the resolv.conf file. (If the DNS address is not deleted, the accuracy of the automatically-obtained DNS address during template deployment will be affected.) |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM and choose Deploy VM Using Template > Basic Information > Configure VM. In the Customize OS tab page, select Customize using the Customization Wizard and set the computer name and administrator password, and set the VM attribute specification name. (Expected result 1) |
Expected Result | 1. The customized attributes are correctly configured. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM and choose Deploy VM Using Template > Basic Information > Configure VM. In the Customize OS tab page, select Customize using the Customization Wizard and set the computer name and administrator password, and set the VM attribute specification name. (Expected result 1) First time: |
Conclusion | Passed |
Remarks |
3.14.3 Testing the Customized Configuration When the VRM Active/Standby Switchover Is Performed During IPv4 Address Customization
Objective | Verify that the customization configuration is normal when the VRM active/standby switchover is performed during IPv4 address customization. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM is successfully converted to a template. Before converting the VM to a template, run the cat /etc/resolv.conf command to check whether the DNS address is automatically-obtained. If so, delete the automatically-obtained address from the resolv.conf file. (If the DNS address is not deleted, the accuracy of the automatically-obtained DNS address will be affected during template deployment.) 3. An IPv4 DHCP server has been configured on the network where the VM resides. 4. FusionCompute has been deployed in active/standby mode. |
Procedure | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure the computer name and administrator password, and set the network resource management type to workgroup and the network resource management name to workgroup name. |
Expected Result | 1. After the VRM switchover, the customized IPv4 configuration is normal. |
Test Result | 1. Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure the computer name and administrator password, and set the network resource management type to workgroup and the network resource management name to workgroup name. 2. Customize NIC settings, set IP type to IPv4, configure the IP address and subnet mask, enable IPv4 route information, and configure the IPv4 route gateway, IPv4 destination network, IPv4 destination network mask, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). 3. Trigger an active/standby VRM switchover during VM customization. For details, see section « How Do I Perform Switchover Between Active and Standby VRM Nodes? » in FusionCompute Product Documentation. After the switchover is complete, expected result 1 is obtained. |
Conclusion | Passed |
Remarks |
3.14.4 Verifying that IPv4 Addresses Can Be Customized for the Three VMs at the Same Time
Objective | Verify that IPv4 addresses can be customized for the three VMs at the same time. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. A guest OS VM to be tested has been created and VMTools corresponding to the SIA has been installed on the VM. 2. The VM has been converted to a template. Before converting the VM to a template, run the cat /etc/resolv.conf command to check whether the DNS address is automatically obtained. If so, delete the automatically-obtained address from the resolv.conf file. (If the DNS address is not deleted, the accuracy of the automatically-obtained DNS address will be affected during template deployment.) 3. An IPv4 DHCP server has been configured on the network where the VM resides. 4. FusionCompute has been deployed in active/standby mode. |
Procedure | 1. Deploy VM 1 using a template: Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure the computer name and administrator password, and set the network resource management type to workgroup and the network resource management name to workgroup name. Customize NIC settings, set IP Type to IPv4, configure the IP address and subnet mask, enable IPv4 route information, and configure the IPv4 route gateway, IPv4 destination network, IPv4 destination network mask, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). (Expected result 1) |
Expected Result | 1. The customized IPv4 configuration is normal. |
Test Result | 1. Deploy VM 1 using a template: Choose Resource Pool > VM Templates. Right-click the VM template and choose Deploy VM Using Template. In the displayed box, configure parameters in Basic Information and Configure VM. Then, in the Customize OS tab page, select Customize using the Customization Wizard, configure the computer name and administrator password, and set the network resource management type to workgroup and the network resource management name to workgroup name. Customize NIC settings, set IP Type to IPv4, configure the IP address and subnet mask, enable IPv4 route information, and configure the IPv4 route gateway, IPv4 destination network, IPv4 destination network mask, primary DNS server address (for example, 8.8.8.8), and secondary DNS server address (for example, 114.114.114.114). (Expected result 1) 4. Use the template in step 1 to deploy VM 3. The configuration is the same as that in step 1. (Expected result 1) |
Conclusion | Passed |
Remarks |
3.14.5 Testing the Reliability of Restarting the VRM Service
Objective | Verify that restarting the VRM service is reliable. |
Networking | Networking diagram for verifying functions |
Prerequisites | 1. The VMTools package corresponding to the SIA has been prepared. |
Procedure | 1. After the SIA is upgraded in the FusionCompute environment, restart the VRM services (service vrmd restart and service portal restart) for three times. (Expected result 1) |
Expected Result | 1. Each time after the VRM is reset, the login to the FusionCompute page is normal, and the login using VNC is normal. |
Test Result | 1. After the SIA is upgraded in the FusionCompute environment, restart the VRM services (service vrmd restart and service portal restart) for three times. (Expected result 1) First time: Second time: Third time: |
Conclusion | Passed |
Remarks |
3.14.6 Testing the Reliability Upon a Host Power Failure
Objective | Verify the reliability upon a host power failure. |
Networking | Networking diagram for verifying functions |
Prerequisites | The guest OS VMs to be tested have been created and VMTools corresponding to the SIA has been installed on the VMs. |
Procedure | 1. Deploy VMs whose IPv4 and IPv6 addresses are customized. Set the computer name, administrator password, network resource management type to workgroup and the network resource management name to the workgroup name. Customize the NIC settings, set the IP address type to IPv4 and IPv6, enter the IP address and subnet mask, enable IPv4 route information, enter the IP route gateway, IP destination network, IP destination network mask, primary DNS server address, and secondary DNS server address. |
Expected Result | 1. Customized IPv4 and IPv6 information is not lost. |
Test Result | 1. Deploy VMs whose IPv4 and IPv6 addresses are customized. Set the computer name, administrator password, network resource management type to workgroup and the network resource management name to the workgroup name. Customize the NIC settings, set the IP address type to IPv4 and IPv6, enter the IP address and subnet mask, enable IPv4 route information, enter the IP route gateway, IP destination network, IP destination network mask, primary DNS server address, and secondary DNS server address. First time: |
Conclusion | Passed |
Remarks |
4.Verification Result
4.1 Test Result
The following table lists the result of each test case.
Category | Case No. | Case Name | Test Result |
---|---|---|---|
Guest OS Installation | 3.1.1 | Installing a Guest OS Image in BIOS Mode | Pass |
3.1.2 | Installing a Guest OS Image in UEFI Mode | Pass | |
VMTools Installation, Upgrade, and Uninstallation | 3.2.1 | Installing VMTools | Pass |
3.2.2 | Upgrading and Uninstalling VMTools | Pass | |
VM Lifecycle Management | 3.3.1 | Importing or Exporting a VM Template, Converting a VM to a Template, and Cloning a VM | Pass |
3.3.2 | Testing the VM Power Supply | Pass | |
3.3.3 | Testing the VM Live Migration Function | Pass | |
3.3.4 | Deleting a VM | Pass | |
Disk Hot Swap | 3.4.1 | Attaching a Disk Whose Bus Type Is SCSI to or Detaching It from a Running VM | Pass |
3.4.2 | Attaching a Disk Whose Bus Type Is VIRTIO to or Detaching It from a Running VM | Pass | |
VM NIC Operations | 3.5.1 | Adding a NIC to or Deleting It from a Running VM | Pass |
3.5.2 | Testing the PCI Passthrough NIC of a VM | Pass | |
3.5.3 | Testing the VM NIC in SR-IOV Passthrough Mode | Pass | |
3.5.4 | Testing the Network Configuration of the VM NICs | Pass | |
Adding CPU and Memory to a VM | 3.6.1 | Adjusting the CPU and Memory Specifications of a Running VM | Pass |
3.6.2 | Configuring the CPU and Memory and Restarting a VM for the Configuration to Take Effect | Pass | |
VM Clock Policy | 3.7.1 | Testing the VM Clock Synchronization | Pass |
3.7.2 | Testing the Free Clock Function of the VM | Pass | |
OS Customization | 3.8.1 | Customizing the Computer Name, Password, and NIC (Automatically Obtaining an IPv4 Address) | Pass |
3.8.2 | Customizing the Computer Name, Password, and NIC (with the Specified IPv4 Address and Default Gateway) | Pass | |
3.8.3 | Customizing the Computer Name, Password, and NIC (with Specified IPv4 Address and IPv4 Route Information) | Pass | |
3.8.4 | Customizing the Computer Name, Password, and NIC (Automatically Obtaining an IPv6 Address Through DHCP) | Pass | |
3.8.5 | Customizing the Computer Name, Password, and NIC (Automatically Obtaining an IPv6 Address by Router Advertisement) | Pass | |
3.8.6 | Customizing the Computer Name, Password, and NIC (with Specified IPv6 Address) | Pass | |
3.8.7 | Generating an Initial Password When Customization Is Not Used | Pass | |
Snapshot | 3.9.1 | Creating a Storage Snapshot | Pass |
3.9.2 | Creating a Memory Snapshot | Pass | |
3.9.3 | Creating a Consistency Snapshot | Pass | |
USB Passthrough | 3.10.1 | Verifying the USB Passthrough Function of a VM | Pass |
SSD | 3.11.1 | Binding or Unbinding an SSD from a VM | Pass |
GPU | 3.12.1 | Testing Basic GPU Functions of the Guest OS Passthrough GPU Device in the Windows System | Pass |
3.12.2 | Testing the Basic vGPU Functions of the Guest OS vGPU Device in the Windows System | Pass | |
Other Value-added Functions of the Guest OS | 3.13.1 | Testing NUMA Topology Adjustment | Pass |
3.13.2 | Testing the I/O Suspension Function | Pass | |
Guest OS Basic Reliability Test | 3.14.1 | Testing the Customized IPv4 Configuration After the VM Is Repeatedly Reset | Pass |
3.14.2 | Testing the Customized IPv6 Configuration After the VM Is Repeatedly Reset | Pass | |
3.14.3 | Testing the Customized Configuration When the VRM Active/Standby Switchover Is Performed During IPv4 Address Customization | Pass | |
3.14.4 | Verifying that IPv4 Addresses Can Be Customized for the Three VMs at the Same Time | Pass | |
3.14.5 | Testing the Reliability of Restarting the VRM Service | Pass | |
3.14.6 | Testing the Reliability Upon a Host Power Failure | Pass |
4.2 Conclusion
According to the test result, FusionCompute is compatible with guest OS (Windows Server 2022).