Skip to content

User Guide

Service Delivery Process

At RunSun Cloud, we are committed to delivering exceptional services that are tailored to meet your specific needs. To ensure a smooth and successful engagement, we follow a standard process that encompasses customer requirement collection, solution design, proof of concept (PoC) and testing, delivery, and ongoing maintenance. This user guide provides an overview of each stage of the process.

  • Customer Requirement Collection:

    The process begins by engaging with you, the customer, to gather a comprehensive understanding of your networking, computing, and data management requirements. We value your input and take the time to listen to your challenges, goals, and desired outcomes. This collaborative phase ensures that we have a clear understanding of your needs and can tailor our solutions accordingly.

  • Solution Design:

    Once your requirements have been collected, our team of experts performs a detailed analysis to design the most suitable solution for your business. Leveraging our expertise in networking, computing, and data management, we develop a comprehensive and scalable solution that addresses your pain points and optimizes your workflow. The solution design phase considers factors such as performance, security, scalability, and cost-effectiveness.

  • Proof of Concept (PoC) and Testing:

    To validate the proposed solution and ensure its feasibility, we conduct a proof of concept (PoC) and rigorous testing. This step allows us to evaluate the solution in a controlled environment, identify any potential issues, and make necessary adjustments. Our team works closely with you during this phase to address any concerns and ensure that the solution meets your specific requirements.

  • Delivery:

    Once the solution has been validated through the PoC and testing phase, we proceed with the delivery process. Our skilled technicians and project managers work diligently to implement the solution efficiently, minimizing disruption to your operations. We ensure a seamless transition and provide you with the necessary training and documentation to effectively utilize the delivered services.

  • Maintenance:

    We understand that technology landscapes evolve, and ongoing maintenance is crucial to ensure the optimal performance of your solution. We offer comprehensive maintenance and support services to address any issues that may arise, provide updates and enhancements, and ensure the continued success of your implemented solution. Our dedicated support team is available to assist you and promptly resolve any concerns.

    By following this standard process, we aim to provide you with a seamless and tailored experience, delivering solutions that meet your unique requirements while ensuring high performance, security, and scalability.

Service Guide

GPU Computing Service

This user guide will provide you with step-by-step instructions on how to access and utilize our GPU computing servers effectively. We offer two authentication methods: SSH password authentication and SSH key-based authentication. Please follow the appropriate section below based on your preferred authentication method.

SSH Password Authentication

  • SSH Login Information:

    To begin, we will provide you with the SSH (Secure Shell) login information, including the server IP address, port number, username, and password. Make sure to keep this information secure and accessible for future reference.

  • Establishing an SSH Connection:

    To access the GPU computing server, you need an SSH client installed on your local machine. If you are using Linux or macOS, you can use the built-in Terminal application. For Windows users, we recommend using popular SSH clients like PuTTY or Bitvise SSH Client.

    Open the SSH client of your choice and enter the provided server IP address or hostname, port number, username, and password in the respective fields. Click "Connect" or press Enter to initiate the SSH connection.

  • Authenticating and Logging In:

    Once the SSH connection is established, you will be prompted to authenticate. Enter the username and password provided to you. Note that passwords are typically not displayed while typing, so enter them carefully.

    After entering the correct credentials, press Enter to log in to the GPU computing server. You should now have access to a command-line interface (CLI) where you can execute commands and interact with the server.

SSH Key-Based Authentication

  • Establishing an SSH Connection:

    Using your SSH client, enter the provided server IP address, port number, and username. Ensure that your private key is loaded into your SSH client.

  • Authenticating and Logging In:

    With the SSH key-based authentication configured, you will not be prompted for a password. Instead, the private key on your local machine will authenticate your connection to the GPU computing server.

Networking Service

Thank you for choosing our networking service. With our comprehensive configuration and setup process, we ensure that all the necessary networking configurations are handled before delivering the service to you. This user guide will provide you with an overview of our networking service and explain how it works seamlessly for your convenience.

Network Setup and Configuration

IP Address Allocation: We will assign IP addresses to your devices or services as per your requirements.

  • Subnetting: If necessary, we will divide your network into subnets to manage and organize your devices effectively.
  • Routing: Our team will configure routers and switches to enable smooth communication between different network segments.
  • Firewall Configuration: We will set up firewalls and security measures to protect your network from unauthorized access and potential threats.
  • DNS (Domain Name System): We can assist in configuring DNS settings to associate domain names with IP addresses, enabling easier access to your services.

Network Monitoring and Maintenance

  • Network Performance Monitoring: We monitor network traffic, bandwidth utilization, latency, and other factors to identify and resolve any performance issues promptly.

  • Security Updates: Our team keeps the network infrastructure up to date with the latest security patches and updates to protect against vulnerabilities.

  • Troubleshooting and Support: If you encounter any network-related issues or have questions, our support team is available to assist you.

Service Delivery

  • Network Connection Details: We will provide you with information such as IP addresses, subnet masks, gateway addresses, and DNS server information.

  • Network Access Credentials: If applicable, we will provide you with usernames and passwords or any other authentication details required to access specific network resources or services.

Utilizing the Networking Service

  • Connecting Devices: Connect your computers, servers, or other devices to the network using the appropriate network cables or wireless connectivity options.

  • Accessing Network Resources: Once connected, you can access shared resources such as files, printers, or databases located on the network.

  • Communicating Across the Network: Utilize network protocols and applications to communicate with other devices, access the internet, or transfer data.

We are committed to providing ongoing support and assistance to ensure your networking service operates smoothly. If you have any questions, encounter issues, or require any changes or expansions to your network, our support team is available to assist you.

Please note that the specific details and functionalities of your networking service may vary based on your requirements and the agreed-upon service level. Our team will work closely with you to ensure that the networking service aligns with your needs.

Storage Service

To ensure a seamless experience, our team will handle the configuration process on the server side and provide you with a detailed user guide tailored to your specific requirements and solution. This guide will walk you through the necessary steps to mount the storage to your servers. Please refer to the instructions below:

Mounting the Storage:

To access and utilize the storage service, you will need to mount the storage to your servers. Follow these steps:

  1. Connect to Your Server:

    Use your preferred method to connect to the server where you want to mount the storage.

  2. Verify Disk Availability:

    Before mounting the storage, verify that the server recognizes the disk. You can use the lsblk or fdisk -l command to list the available disks and identify the newly added storage device. Note the device name (e.g., /dev/sdb) for the next step.

  3. Create a Mount Point:

    Choose a directory on your server where you want to mount the storage. You can create a new directory using the mkdir command. For example: sudo mkdir /mnt/storage

  4. Mount the Storage:

    Now, you can mount the storage using the mount command. Replace /dev/sdb in the example below with the device name you obtained in step b, and /mnt/storage with the path to your chosen mount point: sudo mount /dev/sdb /mnt/storage

  5. Verify the Mount:

    To ensure that the storage is successfully mounted, you can use the df -h command to display the mounted file systems. Look for the entry corresponding to your mounted storage device.

Automating the Mount Process (Optional):

If you want the storage to be automatically mounted every time the server starts, you can add an entry to the /etc/fstab file. This will ensure that the storage is mounted at boot time. Edit the /etc/fstab file using a text editor such as vi or nano and add the following line at the end:

/dev/sdb /mnt/storage ext4 defaults 0 0

Remember to replace /dev/sdb and /mnt/storage with the appropriate device name and mount point.

Save the changes and exit the text editor. To apply the changes without restarting, you can use the mount -a command.

TIP

Please note that the above instructions are general guidelines, and your specific storage solution may require additional or slightly different steps. The user guide we provide will include detailed instructions and any specific configurations or considerations for your storage service.

If you have any questions or encounter any issues during the mounting process, please don't hesitate to contact our support team. We are here to assist you and ensure that the storage service meets your needs.

Data Migration Service

We aim to provide a seamless experience for transferring your data to our storage service. In this user guide, we will explain the process and options available for data migration, including utilizing our transfer server as a bridge for improved connection quality and bandwidth. Please follow the instructions below:

  • Preparing the Storage Service and Connection Information:

    Our team at RunSun Cloud will prepare the storage service and provide you with the necessary connection information. This includes details such as IP addresses, credentials, and protocols required to access and transfer data to our storage service.

  • Connecting to the Storage Service:

    You can connect to our storage service using various protocols, such as FTP, SFTP, or SCP, depending on your specific requirements and preferences. Use the provided connection information to establish a connection from your server to our storage service.

  • Transferring Data:

    Once connected to the storage service, you can initiate the data transfer process. There are two options available:

  1. Direct Transfer:

    You can transfer the data directly from your server to our storage service. This method requires a stable and reliable network connection between your server and our storage service.

  2. Utilizing the Transfer Server:

    To enhance the data transfer process, we offer a transfer server as a bridge. This transfer server is strategically located to provide better connection quality and bandwidth between your server and our storage service. To utilize the transfer server, follow these steps:

    1. Connect to the Transfer Server:

      Using the connection information provided by RunSun Cloud, establish a connection from your server to the transfer server. This may involve using protocols such as FTP, SFTP, or SCP.

    2. Transfer Data to the Transfer Server:

      Once connected to the transfer server, transfer your data from your server to the transfer server. This step benefits from the improved connection quality and bandwidth provided by the transfer server.

    3. Transfer Data from the Transfer Server to Storage:

      After transferring the data to the transfer server, you can initiate a second transfer from the transfer server to our storage service. This ensures that your data seamlessly reaches its destination.

  • Monitoring the Data Transfer:

    During the data transfer process, it is essential to monitor the progress to ensure successful completion. You can use various tools and methods, such as progress indicators, logging, or checksum verification, to track the data transfer and verify data integrity.

  • Data Migration Completion:

    Once the data transfer is complete, verify that all your data has been successfully migrated to our storage service. You can perform spot checks or compare checksums to ensure data integrity.

  • Post-Migration Cleanup:

    After confirming successful data migration, you can clean up any temporary files or data remnants left on your server or the transfer server, depending on the method you used for the data transfer.

Please note that the specific details and options available for data migration may vary based on your requirements and the agreed-upon service level. Our team at RunSun Cloud will work closely with you to ensure a smooth and efficient data migration process.

If you have any questions or encounter any difficulties during the data migration, please don't hesitate to reach out to our support team. We are here to assist you and ensure a successful data migration experience.

Data Transportation Service

We understand that transferring huge amounts of data over the network can be time-consuming and inefficient. To address this, we offer a physical data transportation service where you can copy your data to disk drives, which we will then securely transport to our data center and import the data into our storage service. This guide will walk you through the process of utilizing our data transportation service:

  • Preparing Your Data for Transportation:

    Before initiating the data transportation process, you need to prepare your data for copying onto disk drives. Follow these steps:

    1. Data Selection: Identify the specific data you want to transfer and ensure it is organized and ready for copying. This may involve selecting specific files, directories, or databases.

    2. Data Compression and Encryption (Optional): If desired, you can compress and encrypt your data before copying it onto the disk drives. This adds an extra layer of security to protect your data during transportation.

    3. Disk Drive Compatibility: Ensure that the disk drives you plan to use for data transfer are compatible with your systems and capable of storing the amount of data you wish to transport.

  • Copying Data onto Disk Drives:

    Once your data is prepared, follow these steps to copy the data onto the disk drives:

    1. Disk Drive Setup: Prepare the disk drives by formatting them or ensuring they are empty and ready for data copying. Follow any guidelines or instructions provided by the manufacturer.

    2. Data Copy: Use your preferred method (e.g., drag-and-drop, command-line copy) to copy the selected data onto the disk drives. Ensure that the data is copied accurately and completely.

    3. Verification: After copying the data, it is recommended to verify the integrity of the copied data by comparing checksums or performing spot checks.

  • Arranging Data Transportation:

    Once your data is securely copied onto the disk drives, you can arrange for the transportation to our data center. Follow these steps:

    1. Contact Our Support Team: Get in touch with our support team to inform them about your intention to use the data transportation service. Provide them with details such as the size of the data, the number of disk drives, and any specific requirements or instructions.

    2. Logistics and Packaging: Our support team will guide you through the logistics and packaging requirements for shipping the disk drives to our data center. This may include instructions on packaging materials, labeling, and shipping options.

    3. Security and Tracking: We take data security seriously. Our support team will provide you with details on how to securely package and track the shipment to ensure the safe transportation of your data.

  • Data Import and Storage:

    Once the disk drives arrive at our data center, our team will securely import the data into our storage service. This involves the following steps:

    1. Data Verification: We will verify the integrity of the data upon arrival at our data center by performing checksum verification or other integrity checks.

    2. Import Process: Our team will initiate the import process, where the data from the disk drives will be transferred into our storage service. This may involve various procedures and tools specific to our data center infrastructure.

    3. Data Storage: After successful import, your data will be securely stored in our storage service, ready for you to access and utilize.

  • Disk Drive Return or Disposal:

    Once the data is imported into our storage service, you can coordinate with our support team regarding the return or disposal of the disk drives. If you wish to have the disk drives returned to you, our team will provide instructions for securely packaging and shipping them back. If disk drive disposal is preferred, we will ensure that it is done securely and in compliance with relevant regulations.

Please note that the specific details and procedures for our data transportation service may vary based on your requirements and the agreed-upon service level. Our support team will work closely with you to ensure a smooth and efficient data transportation experience.

If you have any questions or require further assistance during the data transportation process, please don't hesitate to contact our support team. We are here to assist you and ensure a successful data transfer.

CPU Computing Service

We understand that some tasks require significant CPU power without the need for GPUs. To meet this demand, we offer bare metal servers optimized for CPU-intensive workloads. This guide will provide you with a quick overview of how to utilize our CPU computing service efficiently.

Please refer to GPU Computing Service Guide since the basic operation is the same.

Please note that the specific steps and considerations for utilizing our CPU computing service may vary based on your requirements and the agreed-upon service level. Our support team will be available to assist you throughout the process and provide guidance tailored to your specific needs.

If you have any questions or require further assistance while using our CPU computing service, please don't hesitate to contact our support team. We are here to help ensure a smooth and efficient computing experience.