Elastic Cloud Server Video

An Elastic Cloud Server (ECS) is a scalable, on-demand computing server that consists of CPUs, memory, and disks. ECS works with other services such as Virtual Private Cloud (VPC) and backup services to provide a secure and efficient computing environment, ensuring reliable and uninterrupted services.

Stability and Reliability

If a host fault occurs, the ECSs on the host are automatically migrated to a functional host, ensuring 99.95% service availability. Multiple copies of your data ensures 99.99999% data persistence. ECSs and EVS disks can be backed up and restored.

Security

The network of your ECS is completely isolated. Security group rules protect the network from viruses and Trojans. Multi-dimensional security protection mechanisms are at no additional charge.

Competitive Advantage

Huawei leverages years of hardware development and customization experience to ensure an optimal user experience based on Huawei-developed virtualization.

Auto Scaling

ECS specifications and bandwidths can be adjusted to meet service and cost requirements at any time. Excellent computing performance is ensured through ECS+BMS networking.

Application Scenarios

  • Internet

  • E-Commerce

  • Data Analysis

  • HPC

Internet

Website Applications

General-purpose ECSs provide a balance of compute, memory, and network resources. They meet the cloud service needs of both enterprises and individuals and are perfect for medium-load applications, such as enterprise websites, website development and testing environments, or small-scale databases.

Advantages

  • Low Cost

    No special requirements on CPUs, memory, disk space, or bandwidth.

    Secure

    Multidimensional security defenses for 100% network isolation, protecting the network from viruses and Trojans.

    Easy to Maintain

    Uniform O&M platform facilitates maintenance.

Related Services

VPC

AS

ELB

E-Commerce

E-Commerce

Memory-optimized ECSs provide large memory capacities, high-I/O EVS disks, and appropriate bandwidths. They are perfect for applications needing to process large amounts of data and handle highly concurrent data access requests. Examples of such applications include precision marketing, e-commerce, and mobile apps.

Advantages

  • Large Memory Capacity

    Large-memory ECSs are capable of handling demanding storage loads.

    Fast Read and Write

    High-I/O EVS disks support fast data switching and processing.

    High Bandwidth

    Able to handle highly concurrent data access requests.

Related Services

ELB

AS

OBS

Data Analytics

Data Analytics

Disk-intensive ECSs provide a network bandwidth of up to 10GE with high packets per second (PPS) rates and low network latency. They are perfect for applications requiring sequential read/write operations on ultra-large datasets in local storage (such as distributed Hadoop computing), plus large-scale parallel data and log processing.

Advantages

  • Fast Read and Write

    High sequential read/write performance and low latency with the use of local disks.

    High-Speed Computing

    Powerful and stable computing ensures efficient handling of computing loads.

HPC

HPC

ECSs with a large number of CPUs are suitable for applications demanding high performance in massive parallel computing and massive storage. Examples of such applications include scientific computing, genetic engineering, game animations, and bio-pharmaceuticals.

Advantages

  • High Performance Computing

    Able to run applications needing to handle massive parallel computing.

Related Services

VPN

AS

EVS

OBS

Functions

  • Computing Capability

    Multiple computing types, specifications, instance types, and NICs

  • Security Protection

    Worry free comprehensive security protection

  • Storage Capability

    Scalable, reliable high-throughput virtual block storage based on distributed architecture

Computing Capability
  • A variety of ECS types for a variety of scenario requirements
  • Multiple, customizable specifications for each ECS type
  • Supports multiple hardware architectures, such as Arm and x86, and live migration of ECSs with CPUs of different generations in the same architecture
  • Multiple NICs, and ECSs that each supports 1 primary NIC and up to 11 extended NICs
Security Protection
  • Dedicated anti-DDoS devices provide you with refined anti-DDoS protection for Internet applications, defending you from DDoS attacks, such as CC, SYN flood, and UDP flood. You can configure parameters to specify the threshold for DDoS prevention based on rented bandwidth and service model. When the system detects a DDoS attack, it notifies you that it is defending against the attack.
  • User cloud environment security evaluation helps you quickly identify security vulnerabilities and threats. Security configuration check and optimal security recommendations reduce or eliminate user loss from network viruses or attacks.
  • Secure, simple-to-use, cloud-based encryption and key management on the KMS console allows you to encrypt data from other cloud services, relieving you of non-service concerns.
  • Working with a globally renowned digital certificate service institute, Huawei provides one-stop lifecycle management of Secure Sockets Layer (SSL) certificates and Transport Layer Security (TLS) certificates to provide reliable identity authentication and secure data transmission for websites.
  • Security detection clients on the ECSs and the anti-intrusion control center of the cloud platform provide real-time, visualized intrusion trace detection. Additionally, security scanning identifies system vulnerabilities and web page backdoors in the ECSs, ensuring ECS security and minimizing intrusion risks.
  • Security detection is provided for ECSs. The agents installed on ECSs periodically scan the OSs, helping you become aware of OS security vulnerabilities in a timely fashion, so that you can take measures to fix these vulnerabilities before they are used to attack the system.
  • Various scanning services are provided, including general web vulnerability scanning, third-party application vulnerability scanning, port detection, and fingerprint identification.
  • DNS-based WAF filters out hacker attacks, hides and protects ECS EIPs, and protects web applications on ECSs from common attacks, including SQL injection, cross-site scripting (XSS) attacks, web shell uploading, chain theft, and IP whitelist/blacklist.
  • Intelligent process management service automatically prohibits the execution of unauthorized programs based on a customized whitelist, thereby ensuring ECS security.
  • Big data mining and machine learning comprehensively analyze user security, helping you accurately assess ECS security.
Storage Capability
  • High reliability: The 3-data-copy mechanism provides 99.99999% data persistency, ensuring data security and reliability.
  • High performance: Each EVS disk supports up to 20,000 IOPS and 350 MB/s throughput with a minimal latency of 1 ms. You can select EVS disks providing different performance based on service requirements.
  • Flexible: Ultra-large block storage (max. 32 TB per disk), dynamic online capacity expansion, and pay-per-use option.
  • Rich features: Features include disk sharing, disk encryption, disk and server backups, and snapshots.
  • Usability: EVS is easy to learn and use.
  • Backup and restoration: You can create data backups for EVS disks and use the backups to restore the EVS disks, maximizing data security and correctness and ensuring service security.
  • EVS provides you with massive, secure, highly reliable, and low-cost data storage capabilities to store non-structured data, such as documents, photos, audios, and videos.
  • Management Platform

    Multi-mode management via management console, remote access, and APIs with full rights

  • Network Access

    Dedicated network transmission channels that are fast, stable, and secure

  • Flexible Image Selection

    ECS creation using both public and private images.ECSs can be provisioned by system disk image, data disk image, full-ECS image, and full-ECS backup.

  • You can manage ECSs like traditional servers, such as remotely logging in to the ECSs and performing all operations.
  • Using the management console, APIs, or commands, you can restart ECSs, reset login passwords, and isolate the ECS network.
  • Using the management console or APIs, you can manage one or thousands of ECSs.
  • If the ECS OS malfunctions due to misoperations, attacks, or data tampering, you can reinstall it.
  • ECSs can automatically scale in or out based on service requirements. You can customize AS configurations and policies to both meet service requirements and reduce resource consumption.
  • You can easily build isolated virtual network environments with full control rights, including applying for EIPs or bandwidths, creating subnets, in addition to configuring DHCP and security groups.
  • You can use Direct Connect or virtual private networks (VPNs) to interconnect VPCs with traditional data centers to flexibly integrate resources.
  • Convenient: Allows you to create a private image using an ECS or an ECS system disk backup, or create ECSs in batches using an image.
  • Secure: Stores private images using the multi-data-copy mechanism, providing data persistency of 99.999999999%.
  • Flexible: Allows you to customize image management using the management console or open APIs.
  • Unified: Implements unified application deployment and upgrade using customized images to improve maintenance efficiency. This ensures application environment consistency and simplifies upgrade and maintenance.
  • Public image: a standard, widely used image on HUAWEI CLOUD Stack. It contains an OS, comes with preinstalled public applications, and is available to all users. You can configure the application environment and required software using a public image.
  • Private image: an image created using an ECS or external image file and is available only to the user who created it. It contains an OS, preinstalled public applications, and the user's private applications. Using a private image to create ECSs removes the need to configure multiple ECSs repeatedly.
  • Shared image: a private image shared by another user. It contains an OS, preinstalled public applications, and the user's private applications and is available only to the image owner and the users with which the private image is shared. You can select a shared image to create ECSs.
  • With the provided image management and self-service capabilities, you can flexibly use public or private images to create ECSs.
  • Monitoring

    Open platform for real-time resource monitoring, alarming, and notification

  • Auto Scaling

    Automatic resource adjustments based on service requirements and AS policies

  • Load Balancing

    Automatic distribution of access traffic across ECSs

  • You can manage ECSs like traditional servers, such as remotely logging in to the ECSs and performing all operations.
  • Real-time: The monitoring function samples monitored metrics in real time, correctly generates resource monitoring alarms, and sends notifications to related personnel immediately after the alarms are triggered.
  • Cost-effective: The monitoring function is provisioned free of charge and allows you to view monitoring charts in real time.
  • Multiple notification methods: Simple Message Notification (SMN) supports notification using emails and mobile phone text messages to allow you to promptly check service running status. SMN can also send alarms using HTTP to the alarm server, allowing you to handle the alarms using a program.
  • Flexible: AS automatically increases or decreases the number of ECSs in an AS group based on various AS policies, such as periodic, scheduled, or alarm-triggered AS policies. Additionally, AS automatically binds the ECSs newly added to the AS group to a load balancing listener.
  • High availability: AS automatically checks the running status of ECSs in an AS group, removes unhealthy ECSs, and enables new ECSs to ensure proper service running.
  • Visualized: AS provides visual display for overall monitoring and intuitively displays monitoring graphs for each AS group, helping you predict service changes and manage O&M.
  • Low cost: You are charged only for the ECS resources that you used.
  • High availability: Uses the redundancy design to automatically remove malfunctioned nodes and reroute traffic between functional nodes to ensure service availability.
  • Highly flexible: Automatically expands the processing capability based on application traffic and seamlessly integrates with AS to meet the requirements posed by traffic changes.
  • High performance: Supports up to 100,000 concurrent connections to meet large traffic requirements. Supports load sharing using Layer 4 protocol (TCP) or Layer 7 protocols (HTTP and HTTPS).

Getting Started

  • Create Product

  • Create ECS

  • Manage ECS

  • Delete ECS

Create Product

Steps

1. Log in to the ManageOne operation plane, and go to the cloud service product console.
2. Click Create Product in the upper right corner of the page.
3. Create a product.

Create ECS

Steps

1. In the upper left corner of the Elastic Cloud Server page, click Apply for ECS.
2. Select a product.
3. Select an availability zone.
4. Configure the flavor, image, and network information and other parameters for the ECS.
5. Click Apply Now.

Manage ECS

Steps

1. Select an ECS.
2. Select the operation to be performed, including:
∙ Modifying the ECS flavor
∙ Reinstalling or changing the ECS OS
∙ Creating an image from an existing ECS
∙ Cloning the ECS
∙ Extending the ECS validity period
∙ Managing the watchdog status
∙ Managing the HA switch
∙ Adding a same storage tag
∙ Remotely logging in to the ECS
∙ Stopping or restarting the ECS
3. Perform the selected operation.

Delete ECS

Steps

1. Select an ECS.

2. In the Operation column of the row that contains the ECS, click More and select Delete to delete it.

Video Tutorials

Creating an Elastic Cloud Server

more>