Getting to Know ECS

  • 30+ Years

    A wealth of experience with ICT infrastructure, technologies and capabilities you can trust

    A wealth of experience with ICT infrastructure, technologies and capabilities you can trust

  • Multi-architecture

    x86, Kunpeng, Ascend, and heterogeneous architectures available for robust computing performance

    x86, Kunpeng, Ascend, and heterogeneous architectures available for robust computing performance

  • 200+ Applications

    Servers used for a wide range of diverse scenarios, from cloud migration to cloud-native applications

    Servers used for a wide range of diverse scenarios, from cloud migration to cloud-native applications

  • 80+ Certifications

    Internationally recognized compliance certifications that ensure neutral, secure, trustworthy services on the cloud

    Internationally recognized compliance certifications that ensure neutral, secure, trustworthy services on the cloud

Application Scenarios

Run virtually any business-critical applications or compute tasks on Huawei Cloud

Websites

Requirements

No special requirements for CPU, memory, and disk space

Moderate bandwidth

Strong security and reliability

Minimal initial investment and low maintenance

Example Scenarios

Corporate websites | Website development and testing | Small databases

Recommended Instance Type

General computing ECSs, which provide a balance of computing, memory, and network resources. This ECS type is ideal for light- and medium-load applications.

In-Memory Databases

Requirements

Large memory

High-volume data processing

Rapid data transfer and processing

Example Scenarios

Precision marketing | E-Commerce | Mobile apps

Recommended Instance Type

Memory-optimized ECSs, which have a large amount of memory, support ultra-high I/O EVS disks, and can be configured with flexible bandwidths. This ECS type is ideal for applications that process large volumes of data.

Big Data Analytics

Requirements

Large data volume processing

High I/O performance and rapid data transfer and processing

Example Scenarios

MapReduce | Hadoop

Recommended Instance Type

Disk-intensive ECSs, which are designed for applications requiring sequential read/write on ultra-large datasets in local storage, as well as large-scale parallel data processing and log processing. Disk-intensive ECSs are HDD-compatible, and feature 10 Gigabit Ethernet network bandwidth, high throughput, and low network latency.

High-Performance Computing

Requirements

High computing performance

High throughput

Example Scenarios

Scientific computing | Genetic engineering | Games and animation | Biopharmaceuticals and storage

Recommended Instance Type

High-performance computing ECSs, which provide a large number of parallel computing resources required by high-performance infrastructure services and applications in addition to meeting storage and rendering needs.

ECS Advantages

ECS supports automated scaling of compute resources based on traffic changes and predefined scaling policies. You can customize ECS specifications including vCPUs, memory, and bandwidth to let your applications run in a flexible, efficient environment.

Reliability

Differentiated EVS disks

Common I/O, high I/O, general purpose SSD, ultra-high I/O, and extreme SSD disks are available for all of your service requirements. You can store data on different types of disks for different needs.

Common I/O EVS disks: They are secure, reliable, and scalable. If your applications process few transactions and require large capacity and moderate read/write speed, you can store data on common I/O EVS disks.

High I/O EVS disks: They provide high performance, scalability, and reliability. If your applications require high performance, high read/write speed, and instant data storage, you can store data on high I/O EVS disks.

General purpose SSDs: This type of disks are cost-effective. You can use them for high-throughput, low-latency applications.

Ultra-high I/O EVS disks: They provide high performance and low latency. They are ideal for read/write-intensive applications requiring extremely high performance and low latency.

Extreme SSDs: They use RDMA that controls congestion at low latency. You can They are ideal for applications that require ultra-large bandwidth and ultra-low latency.

Distributed architecture

ECS provides scalable, reliable, and high-throughput virtual block storage on a distributed architecture. This ensures that data can be rapidly migrated and restored if any data replica is unavailable, preventing data loss caused by a single hardware fault.

Backup and restoration

You can set automatic backup policies to back up in-service ECSs and EVS disks. You can also configure policies on the management console or use an API to back up the data of ECSs and EVS disks at a specified time.

Security

Multi-dimensional protection

A number of security services, such as Web Application Firewall (WAF) and Vulnerability Scan Service (VSS) are available.

Security evaluation

Cloud security evaluation and security configuration check help you identify security vulnerabilities and threats, reducing or eliminating your loss from viruses or attacks.

Intelligent process management

You can customize an allowlist to automatically prohibit the execution of unauthorized programs.

Vulnerability scan

Comprehensive scan services are available, including general web vulnerability scan, third-party application vulnerability scan, port detection, and fingerprint identification.

Hardware and Software

Professional hardware devices

You can deploy ECSs on professional hardware devices that allow in-depth virtualization optimization, delivering best-in-class virtual server performance.

Virtualized resources accessible anytime, anywhere

You can obtain scalable, dedicated resources from the virtualized resource pool anytime, anywhere, so your applications can run in reliable, secure, flexible, and efficient environments. You can use your ECS like the way you are using your local computer.

Scalability

Automated scaling of computing resources

Dynamic scaling: AS automatically increases or decreases the number of ECSs in an AS group based on monitored data.

Periodic/Scheduled scaling: AS increases or decreases the number of ECSs in an AS group at a regular interval or a specified time based on the predicted load or a pre-set plan.

Flexible adjustment of ECS specifications

ECS specifications and bandwidth can be flexibly adjusted based on service requirements.

Flexible billing options

You have the flexibility to choose different billing options like yearly/monthly and pay-per-use based on your service characteristics.

Notes and Constraints on Using ECSs

  • Restricted Usage of ECSs

    Do not use ECSs for unauthorized private servers. Do not use ECSs for fraudulent transactions, such as click farming on e-commerce websites. Do not use ECSs to initiate network attacks, such as DDoS attacks, CC attacks, web attacks, brute force cracking, or to spread viruses and Trojan horses. Do not use ECSs for traffic transit. Do not use ECSs for web crawling. Do not use ECSs to detect other systems like scanning or penetration unless otherwise being authorized. Do not deploy any illegal websites or applications on ECSs. Do not use ECSs to send spams.

  • Precautions for Using Windows ECSs

    Do not stop system processes if you are not sure about the consequences. Otherwise, blue screen of death (BSOD) may occur on the ECS, or the ECS may restart. Ensure that there is at least 2 GB of idle memory. Otherwise, BSOD, frame freezing, or service failure may occur. Do not modify the registry. Otherwise, the system may fail to start. If the modification is mandatory, back up the registry before modifying it. Do not modify ECS clock settings. Otherwise, DHCP lease may fail, leading to the loss of IP addresses. Do not delete the CloudResetPwdAgent or CloudResetPwdUpdateAgent process. Otherwise, one-click password reset will become unavailable. Do not disable virtual memory. Otherwise, system performance may deteriorate, or system exceptions may occur. Do not delete the VMTool program. Otherwise, the ECS may be abnormal.

  • Restricted Operations on ECSs

    Do not uninstall drivers on the ECS hardware. Do not install external hardware devices, such as encryption dongles or USB flash drives on ECSs. Do not change the MAC address of NICs. Do not install virtualization software on ECSs for nested virtualization. Do not associate software licenses with the physical server hosting an ECS. Once an ECS is migrated from one physical server to another, the associated licenses may become invalid. Do not deploy applications on a single ECS if you require high availability. Deploy applications in a cluster or on ECSs working in active/standby mode, or configure automatic ECS startup upon a host failure or startup. Data on ECSs running core applications needs to be backed up. Monitoring needs to be configured for ECSs. Do not change the default DNS server address. If you need to configure a public DNS address, configure both a public and a private DNS address on your ECS.

  • Precautions for Using Linux ECSs

    Do not modify the /etc/issue file. Otherwise, the OS edition will not be identified. Do not delete system directories or files. Otherwise, the system may fail to start or run properly. Do not change the permissions for or names of system directories. Otherwise, the system may fail to start or run properly. Do not upgrade the kernel of the Linux unless necessary. When upgrading a Linux kernel, follow the instructions provided in How Can I Upgrade the Kernel of a Linux ECS? Do not delete the CloudResetPwdAgent or CloudResetPwdUpdateAgent process. Otherwise, one-click password reset will be unavailable. Do not change the default DNS server /etc/resolv.conf. Otherwise, software sources and NTP may be unavailable. Do not modify default intranet configurations, such as IP addresses, subnet mask, and gateway address of an ECS. Otherwise, network exceptions may occur. When configuring networks manually, static IP addresses are preferred. To avoid network exceptions caused by conflicts between NetworkManager and internal network services, do not enable NetworkManager if it is not required, for example, when you install Kubernetes.

Videos About ECS

ECS Service Introduction

03:11

ECS Service Introduction

Setting Up an FTP Site (Windows)

04:15

Setting Up an FTP Site (Windows)

Configuring Multi-User Logins for a Windows ECS

03:55

Configuring Multi-User Logins for a Windows ECS

Modifying ECS Specifications

03:09

Modifying ECS Specifications

We use cookies to improve our site and your experience. By continuing to browse our site you accept our cookie policy. Find out more