Elastic Cloud Server

Elastic Cloud Server (ECS) is provided for you to obtain scalable cloud servers by self service at any time to build a reliable, secure, flexible, and efficient application environment to ensure the stable and continuous running of your services.

Starting from CNY 32.5 month. Get 12 months of service for the price of 10 months.

New GPU-optimized, high-performance, and disk-intensive ECSs are open for reservation.
Apply for GPU-optimized high-performance and disk-intensive ECSs.

Product Advantages

ECS

Traditional Server

Service Availability

ECS Has high reliability. If an ECS becomes faulty, services on this ECS are automatically migrated to another functional one. The service availability reaches 99.95% to ensure service continuity. The multi-data-copy mechanism ensures 99.99995% data persistency.

Traditional Server Is easy to become faulty due to hardware reliability issues. Manual data backup and restoration are difficult and time-consuming.

Secure

ECS The network is 100% isolated and protected using security group rules from viruses and Trojan.

Traditional Server Requires extra security protection services and assurance personnel. The account and data management is troublesome and inefficient.

Auto Scaling

ECS Allows users to adjust host specifications and bandwidths at any time to fully meet service requirements and reduce costs. Supports ECS+physical server hybrid networking to provide excellent computing performance and flexible networking.

Traditional Server The device configuration is fixed and takes long time to modify. The service interruption time is difficult to control, which cannot meet the changing demands.

Easy to Use

ECS Provides an easy-to-use centralized management control to simplify the O&M and management. A variety of products are available on the console, including databases and big data, and can be provisioned and deployed in one-stop mode.

Traditional Server No appropriate software is available for automatically adding or modifying the server configuration to improve efficiency. All the complicated work needs to be manually performed.

Cost-effective

ECS are deployed on clouds, so there is nearly zero infrastructure building and maintenance costs.The yearly/monthly and on-demand charging modes are supported. Users can select one mode as required.

Traditional Server The fee for renting or purchasing servers is high. Many engineers are required to deploy and maintain the servers, causing high manpower costs.

Function Description

  • Computing Capability

    Specifications, ECS types, and NICs (one primary NIC and up to 11 secondary NICs)

  • Security Protection

    All-around security protection allowing users to focus on service development

  • Storage Capability

    High data reliability and I/O throughput provided by virtual block storage which uses the distributed architecture and supports elastic scaling

Computing Capability
  • Provides various ECSs to meet different scenario requirements.
  • Comes with multiple specifications for each ECS type and supports changes to specifications.
  • Supports multiple NICs. Users can configure one primary NIC and up to 11 secondary NICs for one ECS.
  • Provides various ECS types (general-purpose, compute-I, compute-II, memory-optimized, and GPU-enhanced) and different specifications (CPUs and memory) to suit users' service requirements.

Click here to view ECS types and specifications. >

  • Adhering to the mission of providing users with the optimal services, HUAWEI CLOUD offers the latest, high-performance, and appropriate ECS instances and specifications based on the industry and market development to meet differentiated user demands. In addition, HUAWEI CLOUD provides cost-effective service packages and solutions to suit the requirements.
Security Protection
  • Anti-DDoS Service uses dedicated anti-DDoS devices to provide refined anti-DDoS capabilities for customer Internet applications, defending against all DDoS attacks, such as CC, SYN flood, and UDP flood. Users can configure parameters to specify the threshold for DDoS prevention based on the rented bandwidth. When the system detects a DDoS attack, it defends against the attack and notifies the user.
  • Security Index Service evaluates security of the user cloud environment to quickly identify security vulnerabilities and threats. The service also provides security configuration check as well as the optimal security practice suggestions, effectively reducing or eliminating user loss caused by network viruses and attacks.
  • Key Management Service provides easy-to-use and secure cloud-based encryption and key management on a simple key management user interface. The service also supports the encryption feature for other cloud services, eliminating the data security worries.
  • SSL Certificate Service provides one-stop life-cycle management of Secure Sockets Layer (SSL) certificates and Transport Layer Security (TLS) certificates. It is developed by Huawei and globally renowned digital certificate service institutes to offer reliable identity authentication and secure data transmission for web sites.
  • Host Intrusion Detection uses security detection clients deployed on ECSs and works with the anti-intrusion control center of HUAWE CLOUD to provide real-time and visualized intrusion trace detection. In addition, the service uses security scanning to identify system vulnerabilities and web page backdoors in ECSs, thereby effectively protecting the ECS security and reducing intrusion risks.
  • Host Vulnerability Detection provides security detection specified for ECSs. The agents installed on ECSs periodically scan the OSs to help users timely learn the OS security vulnerabilities so that users can take measures to fix these vulnerabilities before they are used to attack the system.
  • Web Scan is used to detect ECS vulnerabilities. It provides various scanning services, including general web vulnerability scanning, third-party application vulnerability scanning, port detection, and fingerprint identification.
  • Web Application Firewall uses Agent installed on ECSs to protect web applications on the ECSs from common web attacks, including SQL injection and cross-site scripting attacks (XSS attacks) and provides webshell uploading protection, anti-leeching, and IP whitelists/blacklists.
  • Web Application Firewall uses the DNS resolution mode. Specifically, the service changes record type A RecordSet in the DNS configuration into CNAME RecordSet and points it to the specified CNAME address to protect web applications. Web Application Firewall filters out attacks to prevent them, thereby hiding and protecting the elastic IP address of ECSs.
  • Penetration Test Service is a management platform of penetration test service orders. Users can create a penetration test service order on the platform. Then, the platform will automatically forward the order to a third-party security company using emails.
  • Application Recognition Service is an intelligent process management process. Based on a customized whitelist, the service automatically prohibits execution of unauthorized programs, thereby ensuring the ECS security.
  • Security Situation Awareness uses big data mining and machine learning to comprehensively analyze users' security status, helping users to accurately obtain the ECS security information.
  • Web Tamper Protection uses file drives to comprehensively protect a specified user directory from hackers and viruses which tamper or destroy files such as web pages, digital documents, photos, and databases in the directory.
Storage Capability

Elastic Volume Service (EVS) is a scalable virtual block storage service based on the distributed architecture. It provides high data reliability and high I/O throughput. Like hard disks of traditional servers, users can attach an EVS disk to an ECS and perform a series of operations, such as formatting the disk, creating a file system, and storing data to the EVS disk permanently.

  • High reliability: The 3-data-replica mechanism provides 99.99995% data persistency, ensuring data security and reliability.
  • High performance: Each EVS disk supports 20,000 IOPS and 350 MB/s throughput at most. Users can select EVS disks providing different performance based on service requirements.
  • Large capacity: The service provides block storages with ultra-large capacity. At most ten EVS disks can be attached to an ECS, and each EVS disk provides up to 32 TB storage capacity. EVS supports elastic scaling and is paid per use, which is highly cost effective.
  • Various specifications: Three types of EVS disks, average I/O, high I/O, and ultra-high I/O EVS disks, are available to users to meet different service scenario requirements. New specifications will be available later, and users can use them without any of other operations.
    Disk Type Maximum Storage Capacity/Disk (TB) Maximum IOPS/Disk Maximum Throughput/Disk (Mbit/s) Latency (ms)
    Average I/O (SATA) 32T 1000 90MBps 10ms
    High I/O (SAS) 32T 3000 150MBps 3ms
    Ultra-high I/O (SSD) 32T 20000 350MBps 2ms
  • Usability: Is easy to use and has low skill requirements for users.

Provides various cloud services.

  • Volume Backup Service backs up an EVS disk and uses the backup to restore the EVS disk when necessary, thereby maximally protecting accuracy and security of user data in the EVS disk.
  • Object Storage Service provides users with massive, secure, highly reliable, and low-cost data storage capabilities to store non-structured data, such as documents, photos, audios, and videos.
  • Data Express Service is a solution for massive data transmission. It uses physical storage media, such as external Universal Serial Bus (USBs) and external Serial Advanced Technology Attachment (eSATA) hard disk drivers, to transmit massive data to HUAWEI CLOUD. This service resolves the problems in massive data transmission, such as high network costs and long transmission time.
  • Data Transfer Acceleration reliably and rapidly transmits data of users outside HUAWEI CLOUD to this platform. The size of the transmitted data is not limited. Compared with traditional data transmission, this service eliminates restrictions on large file transmission, improves data transmission efficiency, and reduces uses' bandwidth costs. The service supports accelerated data transmission from a system outside of the cloud service platform to OBS.
  • Scalable File Service provides fully-hosted shared file storage for ECSs. It uses the standard file protocol (NFS) and can scale the storage size to a PB level. With its scalable performance, the service strongly supports applications involving massive data and high bandwidths.
  • Management Platform

    Provides multiple management methods, such as the console, remote terminal, and APIs, to offer full management rights to users.

  • Network Access

    Provides secure, stable, high-speed, isolated, and dedicated network transmission channels.

  • Self-Service Selected Images

    Allows users to flexibly use a public or private image to apply for an ECS and provides comprehensive image management capabilities.

Provides multiple management methods, such as the console, remote terminal, and APIs, to offer full management rights to users.

  • Users can manage ECSs like traditional servers, such as remotely logging in to the terminals, resolving OS problems, and performing all operations.
  • Using the management console, APIs, and commands, users can restart ECSs, reset login passwords, and isolate the network.
  • In addition, users can use the web-based console or open APIs to manage one or thousands ECSs.

We will consistently optimize the management platform based on users' feedback to provide more functions and better user experience and respond more rapidly and efficiently.

  • If the ECS OS malfunctions due to misoperations, attacks, or data tampering, users can reinstall it to restore it.
  • In addition, ECSs can automatically scale in or out based on service requirements. Users can customize scaling configurations and policies to both meet service requirements and reduce resource consumption.

HUAWEI CLOUD provides secure, stable, high-speed, isolated, and dedicated network transmission channels.

  • Virtual Private Cloud helps users to easily build an isolated virtual network based on HUAWEI CLOUD. Users can fully control their virtual networks and perform a series of operations, such as applying for elastic bandwidths and IP addresses, creating subnets, configuring DHCP, and configuring security groups. In addition, you can use Direct Connect or Virtual Private Networks (VPN) to connect VPCs with traditional data centers to flexibly integrate resources.
  • Direct Connect is used to build a high-speed, stable, secure, and dedicated channel between the computing environment of enterprises and the users' computing environment on HUAWEI CLOUD. Users can use Direct Connect to connect computers in local data centers to ECSs or hosted servers on HUAWEI CLOUD. This fully uses cloud computing advantages and existing facilities, building a flexible, scalable, and hybrid IT computing environment.
  • VPN establishes a secure and encrypted communication tunnel compliant with industry standards between users' data centers and users' VPC on HUAWEI CLOUD. In addition, VPN helps users seamlessly extend services in the data center to the cloud.

Image Management Service allows users to flexibly use a public or private image to apply for an ECS. It offers comprehensive image management capabilities to users.

  • Convenient: Allows users to create a private image using an ECS or an ECS system disk backup, or create ECSs in batches using an image.
  • Secure: Stores private images using the multi-data-copy mechanism, providing eleven-nines data persistency.
  • Flexible: Allows users to customize image management using the console or open APIs.
  • Unified: Implements unified deployment and upgrades of applications using customized images to improve the maintenance efficiency. This ensures the application environment consistency and simplifies the upgrade and maintenance.

Images of various models supporting rapid deployment of OSs and software on ECSs

  • Public image: contains a standard OS image and preset public applications and is available to all users. Users can configure the application environment and required software to customize a public image.
  • Private image: is created by a user based on ECS instances or an external image file and is available to only the user. It contains an OS, preset public applications, and users' private applications. A private image frees users from repeatedly configuring ECSs during ECS creation.
  • Shared image: contains an OS, preset public applications, and users' private applications. It is a private image for a tenant and is available to its owner and shared users. The users can select this shared image to create an ECS.
  • Image market: Users can purchase various, high-quality third-party images for OSs, applications, and software in the market. Without any configuration, the images allow users to set up a website, develop applications, and manage users' system using a graphical interface with just a few clicks.
  • With the provided image management and self-service capabilities, users can flexibly use public or private images to create ECSs.
  • Cloud Eye

    Is an open monitoring platform that provides real-time resource monitoring, alarm generation, and notification.

  • Auto Scaling

    Automatically scales service resources up or down based on preset policies and user service requirements. Users can configure monitoring policies, such as scheduled or periodically monitoring.

  • Elastic Load Balance

    Automatically distributes the visit traffic to multiple ECSs.

Provides an open monitoring platform that provides real-time resource monitoring, alarm generation, and notification.

  • Users can manage ECSs like traditional servers, such as remotely logging in to the terminals, resolving OS problems, and performing all operations.
  • Real-time: samples monitored metrics in real time, correctly generates resource monitoring alarms, and sends notifications to related personnel immediately after the alarms are triggered.
  • Cost-effective: Enables monitoring free of charge and provides monitoring charts
  • Multiple notification methods: Supports notification using emails and short messages to allow users to learn the service running status at the first time. The service can also send alarms using HTTP to the alarm server, thereby enabling users to use an intelligent program to handle the alarms.

Automatically scales service resources up or down based on preset policies and user service requirements. You can configure scaling policies based on a schedule, a cycle, or situations monitored to enable AS to dynamically adjust the number of ECSs instances, thereby ensuring stable and healthy service running.

  • Flexible: Supports configuration of multiple monitoring policies, such as scheduled and periodic polices, and automatically adds or deletes ECSs. The added ECSs will be automatically listened.
  • High availability: AS automatically checks the running status of instances in a scaling group, removes unhealthy instances, and enables new instances to ensure proper service running. In addition, the service allows users to configure multiple AZs and automatically distribute instances evenly among these AZs.
  • Visualized: Provides overall monitoring charts for scaling groups and scaling change views, helping users predict services and manage O&M.
  • Cost-effective: Charges users by the actual usage amount and reduces O&M costs to put users' investments to best use.

Elastic Load Balance automatically distributes access traffic to multiple ECSs to balance their service load. It enables users to achieve greater levels of fault tolerance for users' applications and expand application service capabilities.

  • High availability: Uses the redundancy design to automatically remove abnormal nodes and reroute traffic between normal nodes to ensure service availability.
  • Highly flexible: Automatically expands the processing capability based on traffic used by applications and seamlessly integrates with AS to meet the requirements posed by traffic changes.
  • High performance: Supports up to 100,000 concurrent connections to meet large traffic requirements, and load sharing using Layer 4 protocols (TCP) and Layer 7 protocols (HTTP and HTTPS).

Application Scenarios

  • Official Enterprise Web Page, Enterprise Office/Development/Test Environment/Small-Scale Database Applications
  • Big Data Analysis (Precise Advertising, E-Commerce, and IoV)
  • HD Videos/Graphics Rendering/Remote Desktops/Engineering Drawing
  • Intensive Computing (MapReduce and Hadoop)
  • Computing and Storage Systems for Scientific Computing, Genetic Engineering, Games and Animations, and Bio-Pharmaceuticals
Official Enterprise Web Page, Enterprise Office/Development/Test Environment/Small-Scale Database Applications

Scenario Features

  • Has no average requirements on CPUs, memory, disk space, and bandwidths.
  • Has high requirements on security and reliability.
  • The services require one or several servers, and the initial investment and maintenance costs are low.

General-purpose ECSs are recommended. They can provide average vCPU performance and balanced computing, memory, and network resources. When the workload surges, this type of ECSs offers better performance during a short period of time. This type of ECSs is suitable for deploying web servers, development environment, and small-scale databases which only occasionally use all vCPU performance.

Learn more >

Deployment Suggestions

  • ①Cooperate with AS to enable the computing capability to automatically scale up or down based on service load changes.
  • ②Cooperate with ELB to implement high availability.
  • ③Cooperate with OBS to provide low-cost large-capacity storage.
  • ④Select appropriate bandwidths for the ECSs.

Recommended Configuration

Multiple ECSs

2-core CPU/4 G memory/5 Mbit/s bandwidth/Average I/O EVS disk (100 GB)
AS (free of charge)
ELB

Big Data Analysis (Precise Advertising, E-Commerce, and IoV)

Scenario Features

  • Has high memory requirements.
  • Involves a large number of data and data visits.
  • Required rapid data exchange and processing.

Memory-optimized ECSs are recommended. This type of ECSs provides large-memory instances and can be equipped with ultra-high-I/O EVS disks and appropriate bandwidths to support application scenarios with preceding features.

Learn more >

Deployment Suggestions

  • ①Use memory-optimized ECSs to obtain large-capacity memory.
  • ②Configure ultra-high-I/O EVS disks.
  • ③Required rapid data exchange and processing.

Recommended Configuration

Multiple ECSs

8-core CPU/64 G memory/10 Mbit/s bandwidth/Ultra-high-I/O EVS disk (100 GB)

HD Videos/Graphics Rendering/Remote Desktops/Engineering Drawing

Scenario Features

  • Has high graphics and video quality requirements.
  • Requires large capacity and memory to process concurrent I/O requests.
  • Involves rapid processing and exchanging of massive data.
  • Demands strong GPU computing capabilities.

GPU-optimized ECSs (G1 and G2 types) are recommended. Users can select a type as required.

  • ECSs of the G1 type provide economical graphics acceleration based on the NVIDIA Tesla M60 hardware virtualization technology. This type supports DirectX and OpenGL and processes graphs with video RAM up to 1 GB and resolution 4096 x 2160, which is suitable for applications having high graphic rendering requirements.
  • ECSs of the G2 type provide graphics acceleration and single-precision computing based on the NVIDIA Tesla M60 PCI pass-through technology. This type supports DirectX, OpenGL, CUDA, and OpenCL and processes graphs with video RAM up to 8 GB and resolution 4096 x 2160, and provides 2048 CUDA cores, which is suitable for media editing, 3D rendering, and code conversion

Learn more >

Deployment Suggestions

  • ① Use ECSs providing GPU capabilities.
  • ② Use high-I/O EVS disks to obtain high I/O and concurrent I/O processing capabilities.

Recommended Configuration

Multiple GPU-optimized ECSs/8-core CPU/16 G memory

Intensive Computing (MapReduce and Hadoop)

Scenario Features

  • Involves massive data processing.
  • Requires high I/O and rapid data exchanging and processing capabilities.

Disk-intensive ECSs are recommended. This type of ECSs is suitable for applications involving high-performance sequential read and write for ultra-large datasets in the local storage, such as distributed Hadoop computing, as well as large-scale parallel data processing and log processing. This type of ECSs uses HDD-based storage instances, and SR-IOV network enhancement is enabled by default to provided high PPS performance and low network jittering and latency. Each such an ECS supports up to 24 local disks, 36 vCPUs, and 256 GB memory.

Learn more >

Recommended Configuration

  • ① Use disk-intensive ECSs.
  • ② Use local disks to obtain high throughput.
  • ③ Enable the SR-IOV network enhancement feature.

Recommended Configuration

Multiple disk-intensive ECSs

16-core CPU/128 G memory/Local storage disk (12 x 1.8 TB)

Computing and Storage Systems for Scientific Computing, Genetic Engineering, Games and Animations, and Bio-Pharmaceuticals

Scenario Features

  • Requires ultra-high computing capabilities.
  • Demands high throughput

High-performance ECSs are recommended. This type of ECSs is suitable for applications requiring high-performance processors (limited by computing resources) and infrastructures requiring massive concurrent computing resources and high performance infrastructure services, and scenarios requiring high-performance computing, large-capacity storage, and efficiency rendering.

Learn more >

Deployment Suggestions

  • ① Use high-performance ECSs to obtain strong computing capabilities.
  • ② Use ultra-high-I/O EVS disks to obtain high I/O and concurrent I/O processing capabilities.
  • ③ Configure high bandwidths to support concurrent I/O processing.

Recommended Configuration

Multiple high-performance ECSs

8-core CPU/16 G memory/10 Mbit/s bandwidth/Ultra-high-I/O EVS disk (100 GB)

Developer Resources

API

Users send HTTP/HTTPS requests for invoking HUAWEI CLOUD APIs to manage users' ECSs, thereby flexibly performing operations on your applications, resources, and data in a rapid, accurate, timely manner.

Region and Endpoint

Information about regions where HUAWEI CLOUD is available and endpoint of each service is provided.

Registration