Elastic Cloud Server

Elastic Cloud Server (ECS) provides scalable, on-demand cloud servers for secure, flexible, and efficient application environments, ensuring reliable, uninterrupted services.

Get 12 months of service for the price of 10.

Multiple configurations are available. Learn more

ECS Types

  •  General Computing 

  • Memory-intensive

  • Computing-intensive

  • Disk-intensive

  • Computing-accelerated

General Computing


Stability and Reliability

When a host experiences a fault, the ECSs on the host are automatically migrated to a functional host, ensuring 99.95% service availability. Multiple copies of your data ensures 99.9999999% data persistence.


Security group rules protect the network from viruses and Trojans. Security services such as Anti-DDoS, WAF, and VSS are included to further enhance ECS security.

Competitive Advantage

Huawei leverages years of hardware development and customization experience to ensure an optimal user experience based on Huawei-developed virtualization.

Auto Scaling

ECS specifications and bandwidths can be adjusted to meet service and cost requirements at any time. Excellent computing performance is ensured through ECS+BMS networking.


  • Computing Capability

    Multiple computing types, specifications, and NICs

  • Security Protection

    Worry free comprehensive security protection

  • Storage Capability

    Scalable, reliable high throughput virtual block storage based on distributed architecture

Computing Capability
  • A variety of ECS types for a variety of scenario requirements
  • Multiple, customizable specifications for each ECS type
  • Multiple NICs, and ECSs that each supports 1 primary NIC and up to 11 extended NICs
  • The latest, top-performing ECS instances from HUAWEI CLOUD, with specifications tailored based on industry and market developments to meet varying user demands
Security Protection
  • Dedicated anti-DDoS devices provide you with refined anti-DDoS protection for Internet applications, defending you from DDoS attacks, such as CC, SYN flood, and UDP flood. You can configure parameters to specify the threshold for DDoS prevention based on rented bandwidth and service model. When the system detects a DDoS attack, it notifies you that it is defending against the attack.
  • User cloud environment security evaluation helps you quickly identify security vulnerabilities and threats. Security configuration check and optimal security recommendations reduce or eliminate user loss from network viruses or attacks.
  • Secure, simple-to-use, cloud-based encryption and key management on the KMS console allows you to encrypt data from other cloud services, relieving you of non-service concerns.
  • Working with a globally renowned digital certificate service institute, Huawei provides one-stop lifecycle management of Secure Sockets Layer (SSL) certificates and Transport Layer Security (TLS) certificates to provide reliable identity authentication and secure data transmission for websites.
  • Security detection clients on the ECSs and the anti-intrusion control center of the cloud platform provide real-time, visualized intrusion trace detection. Additionally, security scanning identifies system vulnerabilities and web page backdoors in the ECSs, ensuring ECS security and minimizing intrusion risks.
  • Security detection is provided for ECSs. The agents installed on ECSs periodically scan the OSs, helping you become aware of OS security vulnerabilities in a timely fashion, so that you can take measures to fix these vulnerabilities before they are used to attack the system.
  • Various scanning services are provided, including general web vulnerability scanning, third-party application vulnerability scanning, port detection, and fingerprint identification.
  • DNS-based WAF filters out hacker attacks, hides and protects ECS EIPs, and protects web applications on ECSs from common attacks, including SQL injection, cross-site scripting (XSS) attacks, web shell uploading, chain theft, and IP whitelist/blacklist.
  • Intelligent process management service automatically prohibits the execution of unauthorized programs based on a customized whitelist, thereby ensuring ECS security.
  • Big data mining and machine learning comprehensively analyze user security, helping you accurately assess ECS security.
  • File drives comprehensively protect specified user directories against hackers or viruses, preventing them from tampering with or destroying files such as web pages, digital documents, photos, or databases.
Storage Capability

Elastic Volume Service (EVS) provides persistent block storage for services such as ECS and BMS. With advanced data redundancy and cache acceleration capabilities, EVS offers high availability and durability with an extremely low latency. You can perform a series of operations on the EVS disk attached to an ECS, such as formatting the disk, creating a file system, or permanently storing data.

  • High reliability: The 3-data-copy mechanism provides 99.9999999% data persistency, ensuring data security and reliability.
  • High performance: Each EVS disk supports up to 20,000 IOPS and 350 MB/s throughput with a minimal latency of 1 ms. You can select EVS disks providing different performance based on service requirements.
  • Flexible: Ultra-large block storage (max. 32 TB per disk), dynamic online capacity expansion, and pay-per-use option.
  • Rich features: Features include disk sharing, disk encryption, disk and server backups, and snapshots.
  • Multiple specifications: Common I/O, high I/O, and ultra-high I/O EVS disks are available for all of your different service requirements. New specifications will be available later, and you can use them directly.
    Disk Type Maximum Capacity of One Disk Maximum IOPS Per Disk Maximum Throughput Per Disk Latency (ms)
    Common I/O 32 TB 1000 90 MB/s 5-10
    High I/O 32 TB 3000 150 MB/s 1-3
    Ultra-high I/O 32 TB 20000 350 MB/s 1
  • Usability: EVS is easy to learn and use.

EVS provides various data services for you:

  • Allows you to create data backups for EVS disks and use the backups to restore the EVS disks, maximizing data security and correctness and ensuring service security.
  • Provides you with massive, secure, highly reliable, and low-cost data storage capabilities to store non-structured data, such as documents, photos, audios, and videos.
  • Provides a solution for massive data transmission, which uses physical storage media, such as external Universal Serial Buses (USBs) or external Serial Advanced Technology Attachment (eSATA) hard disks to transmit massive data to HUAWEI CLOUD. This resolves massive data transmission issues, such as high network costs and long transmission time.
  • Provides hosted shared file storage that complies with the standard file protocol (NFS) and that can scale up to the PB level to support massive data and high-bandwidth applications.
  • Management Platform

    Multi-mode management via management console, remote access, and APIs with full rights

  • Network Access

    Dedicated network transmission channels that are fast, stable, and secure

  • Flexible Image Selection

    ECS creation using both public and private images

Allows you to use multiple management modes, such as the management console, remote access, and APIs, with full rights.

  • You can manage ECSs like traditional servers, such as remotely logging in to the ECSs and performing all operations.
  • Using the management console, APIs, or commands, you can restart ECSs, reset login passwords, and isolate the ECS network.
  • Using the management console or APIs, you can manage one or thousands of ECSs.

Huawei will consistently optimize the management platform based on user feedback to provide more functions and better user experience and respond more rapidly and efficiently.

  • If the ECS OS malfunctions due to misoperations, attacks, or data tampering, you can reinstall it.
  • ECSs can automatically scale in or out based on service requirements. You can customize AS configurations and policies to both meet service requirements and reduce resource consumption.

HUAWEI CLOUD provides secure, stable, fast, dedicated network transmission channels for you.

  • Allows you to easily build isolated virtual network environments with full control rights, including applying for EIPs or bandwidths, creating subnets, in addition to configuring DHCP and security groups. Moreover, you can use Direct Connect or virtual private networks (VPNs) to interconnect VPCs with traditional data centers to flexibly integrate resources.
  • Provides secure, stable, fast, dedicated network transmission channels to interconnect enterprise computing environments with the HUAWEI CLOUD computing environment. You can use Direct Connect to connect computers in local data centers to ECSs or hosted servers on HUAWEI CLOUD through private networks. This fully leverages the advantages of cloud computing and existing facilities for a flexible, scalable, and hybrid IT computing environment.
  • Provides an encrypted communication tunnel compliant with industry standards between users and VPCs, helping users seamlessly extend services from existing data centers to HUAWEI CLOUD.

Allows you to use both public and private images to create ECSs.

  • Convenient: Allows you to create a private image using an ECS or an ECS system disk backup, or create ECSs in batches using an image.
  • Secure: Stores private images using the multi-data-copy mechanism, providing eleven-nines data persistency.
  • Flexible: Allows you to customize image management using the management console or open APIs.
  • Unified: Implements unified application deployment and upgrade using customized images to improve maintenance efficiency. This ensures application environment consistency and simplifies upgrade and maintenance.

Images of various types support rapid deployment of OSs and software on ECSs.

  • Public image: a standard, widely used image on HUAWEI CLOUD. It contains an OS, comes with preinstalled public applications, and is available to all users. You can configure the application environment and required software using a public image.
  • Private image: an image created using an ECS or external image file and is available only to the user who created it. It contains an OS, preinstalled public applications, and the user's private applications. Using a private image to create ECSs removes the need to configure multiple ECSs repeatedly.
  • Shared image: a private image shared by another user. It contains an OS, preinstalled public applications, and the user's private applications and is available only to the image owner and the users with which the private image is shared. You can select a shared image to create ECSs.
  • Marketplace image: a third-party image that has the OS, application environment, and software pre-installed. You can use the images to deploy websites and application development environments with a few clicks. No additional configurations are required.
  • With the provided image management and self-service capabilities, you can flexibly use public or private images to create ECSs.
  • Monitoring

    Open platform for real-time resource monitoring, alarming, and notification

  • Auto Scaling

    Automatic resource adjustments based on service requirements and AS policies

  • Load Balancing

    Automatic distribution of access traffic across ECSs

Cloud Eye provides an open monitoring platform for real-time resource monitoring, alarming, and notification.

  • You can manage ECSs like traditional servers, such as remotely logging in to the ECSs and performing all operations.
  • Real-time: Cloud Eye samples monitored metrics in real time, correctly generates resource monitoring alarms, and sends notifications to related personnel immediately after the alarms are triggered.
  • Cost-effective: Cloud Eye is provisioned free of charge and allows you to view monitoring charts in real time.
  • Multiple notification methods: Cloud Eye supports notification using emails and mobile phone text messages to allow you to promptly check service running status. Cloud Eye can also send alarms using HTTP to the alarm server, allowing you to handle the alarms using a program.

Auto Scaling (AS) automatically adjusts computing resources based on your service requirements and periodic/scheduled/alarm-triggered AS policies to ensure stable service running.

  • Flexible: AS automatically increases or decreases the number of ECSs in an AS group based on various AS policies, such as periodic, scheduled, or alarm-triggered AS policies. Additionally, AS automatically binds the ECSs newly added to the AS group to a load balancing listener.
  • High availability: AS automatically checks the running status of ECSs in an AS group, removes unhealthy ECSs, and enables new ECSs to ensure proper service running. Additionally, AS allows you to configure multiple AZs and evenly distributes the ECSs between the AZs.
  • Visualized: AS provides visual display for overall monitoring and intuitively displays monitoring graphs for each AS group, helping you predict service changes and manage O&M.
  • Low cost: You are charged only for the ECS resources that you used.

Elastic Load Balance (ELB) automatically distributes access traffic to multiple ECSs to balance their service load. It enables higher levels of fault tolerance in your applications and expands application service capabilities.

  • High availability: Uses the redundancy design to automatically remove malfunctioned nodes and reroute traffic between functional nodes to ensure service availability.
  • Highly flexible: Automatically expands the processing capability based on application traffic and seamlessly integrates with AS to meet the requirements posed by traffic changes.
  • High performance: Supports up to 100,000 concurrent connections to meet large traffic requirements. Supports load sharing using Layer 4 protocol (TCP) or Layer 7 protocols (HTTP and HTTPS).

Application Scenarios

  • Internet

  • E-Commerce

  • Graphics Rendering

  • Data Analysis

  • HPC


Scenario Requirements

No special requirements on CPUs, memory, disk space, or bandwidth

Strong security and reliability

Application deployment based on one or only a few ECSs to minimize initial investment and maintenance costs

Scenario Examples

Official websites | Website R&D and testing | Small-scale databases

Recommended Solution

  • Use general-purpose ECSs, which provide a balance of computing, memory, and network resources. This ECS type is appropriate for medium-load applications and meets the cloud service needs of both enterprises and individuals.

Recommended Configurations

ECS  s3.large
vCPUs Memory Bandwidth IP Disk
2 4 GB 5 Mbit/s 1 Common I/O EVS disk, 100 GB

Buy ECS and use AS for free

Buy ECS with ELB for HA

Buy Now

Scenario Requirements

Large amount of memory

Capable of processing large volumes of data

Rapid data switching and processing

Scenario Examples

Precision marketing | E-Commerce | Mobile apps

Recommended Solution

  • Use memory-optimized ECSs, which have a large amount of memory and provide ultra-high I/O EVS disks and appropriate bandwidths. This ECS type is suitable for applications that process large amounts of data.

Recommended Configurations

ECS  m3.2xlarge
vCPUs Memory Bandwidth IP Disk
8 64 GB 10 Mbit/s 1 Ultra-high I/O EVS disk, 100 GB

Buy ECS and use AS for free

Buy Now
Graphics Rendering

Scenario Requirements

High-quality graphics and video

Large amount of memory, capable of processing large volumes of data, and high I/O concurrency

Rapid data switching and processing

High GPU performance

Scenario Examples

HD video | Graphics rendering | Remote desktops | Engineering drawing

Recommended Solution

  • Use GPU-accelerated ECSs, including G1 ECSs, which are based on NVIDIA Tesla M60 hardware virtualization and provide cost-effective graphics acceleration. These ECSs support DirectX and OpenGL, provide computing with up to 1 GB video RAM and 4,096 x 2,160 resolution. These ECSs are used for graphics rendering applications.

Recommended Configurations

ECS  g1.2xlarge
vCPUs Memory Bandwidth IP Disk
8 16 GB 5 Mbit/s 1 High I/O EVS disk, 100 GB

Buy ECS and use AS for free

Buy Now
Data Analysis

Scenario Requirements

Capable of processing large volumes of data

High I/O performance and rapid data switching and processing

Scenario Examples

MapReduce | Hadoop

Recommended Solution

  • Use disk-intensive ECSs, which are designed for applications requiring sequential read/write on ultra-large datasets in local storage (such as distributed Hadoop computing) as well as large-scale parallel data processing and log processing. Disk-intensive ECSs are based on HDD and a default network bandwidth of 10GE, providing high PPS and low network latency. They also support up to 24 local disks, 48 vCPUs, and 384 GB of memory.

Recommended Configurations

ECS  d2.4xlarge.8
vCPUs Memory Bandwidth IP Disk
16 128 GB 5 Mbit/s 1 Local disks, 8 x 1.6 TB

Buy ECS and use AS for free

Buy ECS with ELB for HA

Buy Now

Scenario Requirements

High computing performance

High throughput

Scenario Examples

Scientific computing | Genetic engineering | Games and animation | Biopharmaceuticals

Recommended Solution

  • Use high-performance computing ECSs to meet the computing, storage, and rendering needs of high-performance infrastructure services and applications that require a large number of parallel computing resources.

Recommended Configurations

ECS  h3.2xlarge
vCPUs Memory Bandwidth IP Disk
16 64 GB 10 Mbit/s 1 Ultra-high I/O EVS disk, 100 GB

Buy ECS and use AS for free

Buy ECS with ELB for HA

Buy Now

Create an Account and Experience HUAWEI CLOUD for Free

Register Now