检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Querying ECS Metadata Configuration Function This API is used to query the metadata configuration of an ECS. Constraints The ECS status (which is specified by OS-EXT-STS:vm_state) must be active, stopped, paused, or suspended. URI GET /v1/{project_id}/cloudservers/{server_id}/metadata-options
Kunpeng ECS Specifications and Types A Summary List of Kunpeng ECS Specifications Kunpeng General Computing-plus ECSs Kunpeng Memory-optimized ECSs Kunpeng Ultra-high I/O ECSs Kunpeng AI Inference-accelerated ECSs Parent Topic: ECS Types and Specifications
Methods for Improving ECS Security Scenarios If ECSs are not protected, they may be attacked by viruses, resulting in data leakage or data loss. You can use the methods introduced below to protect your ECSs from viruses or attacks. Protection Types ECS can be protected externally
Purchasing an ECS in a Shared Subnet Scenarios VPC sharing allows multiple accounts to purchase and manage cloud resources in one VPC. With VPC sharing, you can create ECSs in shared subnets for improved resource management and reduced O&M costs. For example, to make resource management
Selecting an ECS Billing Mode Yearly/Monthly Billing Pay-per-Use Billing Spot Pricing Reserved Instances Changing Pay-per-Use to Yearly/Monthly Changing Yearly/Monthly to Pay-per-Use Parent Topic: Instances
Changing the Time Zone for an ECS Scenarios The default time zone for an ECS is the one you selected when creating the image that was used to create the ECS. This section describes how to change the time zone for an ECS to the local one or to another time zone in your network. After
Purchasing a Spot Block ECS Scenarios A spot block ECS is billed in spot pricing mode. You can purchase and use such ECSs at a discount. A spot block ECS performs as well as the ECSs with the same specifications in other billing modes. If inventory resources are insufficient, the
Configuring Secure Boot for an ECS Scenarios Secure boot is used to check the integrity of each component (driver loader, kernel, and kernel driver) during device startup. This prevents security threats to the system and user data caused by loading and running unauthenticated components
Configuring ECS QingTian TPM Scenarios QingTian TPM is a virtual device that complies with the TPM 2.0 specifications. QingTian TPM can be used as the root of trust of an ECS to build a trust chain that covers system boot and user-specified applications and implement remote attestation
Introducing ECS Purchase Options Huawei Cloud provides multiple options for you to purchase ECSs. Table 1 Purchase options of ECSs How to Purchase Description Purchasing an ECS in Quick Config Mode Learn how to purchase an ECS in quick config mode. You can specify the billing mode
Viewing the ECS Creation Status Scenarios After submitting the request for creating an ECS, you can view the creation status. This section describes how to view the creation status of an ECS. Procedure Log in to the management console. Click in the upper left corner and select a region
Why Are Connections to a Linux ECS Using SSH or to Applications on the ECS Interrupted Occasionally? Scenarios This section applies to the scenario where the connection to a Linux ECS using SSH or the access to applications on the ECS is interrupted occasionally. Constraints Modifying
Why Is the Hostname of My ECS Restored to the Original Name After the ECS Is Restarted? The following uses an ECS running CentOS 7 as an example: Log in to the Linux ECS and view the Cloud-Init configuration file. In the /etc/cloud/cloud.cfg file, comment out or delete update_hostname
Viewing and Using Windows ECS Logs Scenarios In Windows ECSs, viewing and using logs is an important part of system management and troubleshooting. Windows uses the built-in Event Viewer to record system, application, and security events. You can monitor system performance, diagnose
Enabling Public Network Access for an ECS This section describes how to enable public network access for an ECS. Using IPv4 to Access Public Networks Method Scenario Characteristics Reference Binding an EIP Suitable for public network access in temporary or dynamic changes or specific
Resetting the Password for Logging In to an ECS in the OS Scenarios This section describes how to reset the password for logging in to an ECS in the OS when the password is about to expire, the password is forgotten, or you are logging in to the ECS for the first time. It is a good
ECS Lag (Windows) Why Is My Windows ECS Running Slowly?
ECS Lag (Linux) Why Is My Linux ECS Running Slowly?
How Is ECS Security Ensured? Host Security Service (HSS) helps you identify and manage the assets on your servers, eliminate risks, and defend against intrusions and web page tampering. There are also advanced protection and security operations functions available to help you easily
Can a Database Be Deployed on an ECS? Yes. You can deploy a database of any type on an ECS. Parent topic: Application Deployment and Software Installation