All Products
Search
Document Center

WUYING Workspace:Modify the configurations of a cloud computer pool

Last Updated:Feb 26, 2024

The configurations of a cloud computer pool determine the settings and scaling policy of cloud computers in the pool. If the configurations of a cloud computer pool no longer meet your business requirements, you can modify the configurations, including the cloud computer pool name, cloud computer template, security policy, and scaling policy. This topic describes how to modify the configurations of a cloud computer pool.

Prerequisites

If you want to change the cloud computer template and the security policy that are associated with your cloud computer pool, make sure that the following operations are complete:

  • A cloud computer template is created, or an existing cloud computer template is used. For information about how to create a cloud computer template, see Create custom cloud computer templates.

  • A security policy is created, or an existing security policy is used. For more information about how to create a security policy, see Create a security policy.

Background information

After you create a cloud computer pool, the system creates a specific number of cloud computers based on the scaling policy that you configured for the cloud computer pool and the number of end users who request to connect to cloud computers. Cloud computers in the cloud computer pool are created by using the same cloud computer template and security policy. You can modify the configurations of the cloud computer pool based on your business requirements to manage cloud computers in the cloud computer pool in a centralized manner. For example, you can perform the following operations for better cloud computer management:

  • By default, the names of cloud computers in a cloud computer pool are the same as the name of the cloud computer pool. You can change the cloud computer pool name to distinguish between the cloud computer pool and the cloud computers.

  • If the number of vCPUs and the memory size of cloud computers in the cloud computer pool no longer meet your business requirements, you can update the cloud computer template.

  • If the security policy that is associated with your cloud computer pool no longer meets security requirements, you can change the security policy.

    Note

    You can also modify the configurations of the existing security policy. For more information, see Modify, clone, or delete a policy.

  • If the number of cloud computers in your cloud computer pool no longer meets the requirements of end users, you can modify related settings.

  • If the reset type of your cloud computer pool no longer meets your business requirements, you can change the reset type settings.

  • You can configure scheduled start and stop tasks that are performed at specific time points based on your business requirements.

Procedure

  1. Log on to the WUYING Workspace (Pro Edition) console.

  2. In the upper-left corner of the top navigation bar, select a region.

  3. In the left-side navigation pane, choose Resources & Terminals > Cloud Computer Pools.

  4. On the Desktop Groups page, find the cloud computer pool that you want to manage and click the ID of the cloud computer pool.

  5. On the Basic Information tab, modify the configurations of the cloud computer pool based on your business requirements.

    Note

    The parameters that can be modified vary based on the cloud computer pool type, billing method, and auto scaling policy. The following table describes the configuration items that you can modify. The parameters that are displayed in your actual business scenario shall prevail.

    Parameter

    Description

    Operation

    Desktop Group Name

    The name of the cloud computer pool. You can search for a cloud computer pool by name.

    Click Modify - Figure next to the Desktop Group Name parameter. In the dialog box that appears, enter a new name and click OK.

    Template Name

    The name of a cloud computer template that defines the cloud computer configurations. The configurations of a cloud computer template include cloud computer specifications and image settings. Cloud computers in a cloud computer pool are created by using the same cloud computer template.

    Click Modify - Figure next to the Template Name parameter. In the panel that appears, select a new template and click OK.

    Policy Group Name

    The name of a security policy for the cloud computer pool. A security policy, sometimes simply referred to as a policy, includes security rules that contain features such as USB redirection and local disk mapping for cloud computers in the cloud computer pool. All cloud computers in a cloud computer pool use the same policy.

    Click Modify - Figure next to the Policy Group Name. In the panel that appears, select a new policy or create a new policy and click OK.

    Billing Method

    The billing method of the cloud computer pool. If the cloud computer pool is billed on a subscription basis, you can view the expiration time and renew cloud computers in the cloud computer pool based on your business requirements.

    Click Renew and proceed as prompted.

    Max. Desktops

    The maximum number of cloud computers contained in the cloud computer pool. You can change the value based on your business requirements.

    Click Modify - Figure next to the Max. Desktops parameter. In the dialog box that appears, enter a new number and click OK.

    Allow Reserved Desktop

    Specifies whether to reserve a specific number of cloud computers in the cloud computer pool. This way, a specific number of cloud computers are always available in the cloud computer pool.

    Turn on Allow Reserved Desktop to reserve a specific number of cloud computer in the cloud computer pool.

    Reserved Desktops

    The number of cloud computers that you want to reserve in the cloud computer pool. You can change the value based on your business requirements.

    Click Modify - Figure next to the Reserved Desktops parameter. In the dialog box that appears, enter a new number and click OK.

    Auto-stop

    Specifies whether to automatically stop idle cloud computers in the cloud computer pool.

    Select Enable and specify an idle interval before the system automatically stops cloud computers.

    Keep-active Duration

    The period in which a session remains active after a cloud computer is unexpectedly disconnected. If an end user reconnects to the cloud computer within this period, the session resumes to the time when the cloud computer was disconnected. You can change the value based on your business requirements.

    Click Modify - Figure next to the Keep-active Duration parameter. In the dialog box that appears, enter a new period and click OK.

    Session Limits

    The upper limit of sessions in the cloud computer pool. You can change the value based on your business requirements.

    Click Modify - Figure next to the Session Limits parameter. In the dialog box that appears, enter a new number and click OK.

    Allow Auto-creation

    Specifies whether to allow the system to automatically create cloud computers in the cloud computer pool. After you enable the feature, the system automatically creates new cloud computers and assigns the cloud computers to end users that request for cloud computer connection when all cloud computers in the cloud computer pool are in use.

    Turn on Allow Auto-creation to allow the system to automatically create cloud computer in the cloud computer pool.

    Max. Auto-created Dekstops

    The maximum number of cloud computers that the system can automatically create in the cloud computer pool. You can change the value based on your business requirements.

    Click Modify - Figure next to the Max. Auto-created Desktops parameter and proceed as prompted.

    User Data Roaming

    Specifies whether to enable the user data roaming feature.

    If you enable the feature, the system stores data from the C:\Users\username directory of the authorized user to the C:\Users directory of the Apsara File Storage NAS (NAS) file system that is mounted to the office network to which the cloud computer pool belongs. Data in the C:\Users\username directory of the authorized user can be dynamically roamed within the cloud computer pool. Each time the user connects to the cloud computer, data in the C:\Users\username directory is synchronized.

    Turn on User Data Roaming to enable this feature.

    Important

    To use this feature, take note of the following limits:

      Reset Type

      The data on the disk of a cloud computer that you want to reset. The system retains a cloud computer for 10 minutes after an end user disconnects from the cloud computer. You can determine how to handle the data on a cloud computer within the retention period. Valid values:

      • None

      • System Disk

      • User Disk

      • System Disk and User Disk

      In the Reset Type section, select a reset type based on your business requirements.

      If you select System Disk, User Disk, or System Disk and User Disk, you must configure the Reset Time or Execution Cycle parameter based on your business requirements.

      Scheduled Start/Stop

      The time when the system automatically starts, stops, or restarts cloud computers in the cloud computer pool. You can select Enable or Disable based on your business requirements.

      If you select Enable, configure the settings as prompted based on your business requirements.

      In the Scheduled Start/Stop Time panel, configure the Start Time, Stop Time, or Restart Time parameter and click OK.

    Result

    The following rules take effect after you modify the configurations of a cloud computer pool:

    • If you change the name of the cloud computer pool, the new name immediately takes effect.

    • If you change the cloud computer template, the system creates new cloud computers by using the new cloud computer template.

    • If you change the security policy, the new security policy applies to all the cloud computers in the cloud computer pool. The configurations in the following features in the new security policy immediately take effect: user preemption, security group rule, domain blacklist and whitelist, and screen recording. Other configurations in the new security policy take effect the next time you connect to the cloud computer.

    • If you change the scaling policy, the system creates or releases cloud computers based on the user connection and the new scaling policy.

    • If you change the reset type of the cloud computer pool, the new reset type immediately takes effect.

    • If you change the scheduled startup and shutdown time of cloud computers in a cloud computer pool, the new configurations immediately take effect.