<p>Elastic Compute Service (ECS)is an elastic compute service based on the virtualization technology of the host. To be specific, it virtualizes various independent hosts based on a group of physical machine cluster. This service integrates server, bandwidth and storage services with high reliance, easy management and flexibility. ECSs are divided into diversified specifications in accordance with their performance and availability. You can choose proper configuration based on the actual business.</p>


<p><strong>Flexible and easy to use</strong></p> <p>Users can define CPU core, memory size, charge mode and use duration to allocate resources reasonably and save costs as operating system types are diversified.</p> <p><strong>Quick deployment</strong></p> <p>Complete the delivery of an ECS in 1-2 minutes; acquire more same configuration through copy technology to save deployment time</p> <p><strong>Elastic expansion </strong></p> <p>Upgrade and expand ECS based on the changes of business development to ensure rapid growth of business. Upgrade CPU and expand memory in 5 minutes in the event of shutdown; online upgrade bandwidth without shutdown</p> <p><strong>Safe and reliable </strong></p> <p>Provide security protection functions such as ECS intrusion detection and DDos protection; availability rate of a host is over 99.95%, ensuring data reliability.</p>

Security group

<p>As shown in the figure below, a security group consists of instance lists and security group rules. Users can add ECS instances into the instance lists of security group and grant access to the ECS instances in instance lists through security group rules.</p> <p><img src="https://obs-cn-shanghai.yun.pingan.com/pacloud/20181903103721-129b285e96ef.png" style="height:302px; width:508px" /></p> <p>Users can enable access rules from ECS instances to &ldquo;authorized IP Address&rdquo; by editing security group rules. To facilitate users to enable the security policy, Ping An Cloud presents security group rules in the form of the white list. That is, all rules are set as <strong>Enable fowarding</strong> by default. If access message can&rsquo;t match any security group rules, the system will prevent the access by default. As shown in the following figure, users can customize access direction. Exit indicates that ECS instance in the instance lists accesses to authorized IP address, that is out of VPC; entrance indicates that authorized IP address acesses to ECS instance in instance lists, that is into VPC.</p> <p><img src="https://obs-cn-shanghai.yun.pingan.com/pacloud/20181903103806-15e787e8945d.png" style="height:201px; width:554px" /></p>

Snapshot introduction

<p><strong>Overview </strong></p> <p>Snapshot refers to copy a disk completely at some time point, including all data status of the disk at this time point. Snapshot can be divided into manual snapshot and automatic snapshot.</p> <p>Manual snapshot is created manually; real-time snapshot for disks can be created manually as per actual needs.</p> <p>Automatic snapshot is automatically created by back-office. Back-office can execute it in accordance with snapshot strategy on the basis of daily, weekly or monthly frequency.</p> <p><strong>Scenarios </strong></p> <p>Daily backup</p> <p>You can create an automatic snapshot for important data disk on the basis of daily, weekly or monthly frequency.</p> <p>App upgrade</p> <p>You can create a disk snapshot before upgrading app, which can help quickly roll back to the pre-upgrade disk status if abnormality occurs during upgrade process.</p> <p>Major changes</p> <p>You can create a snapshot before changing system variables, configuration, or installing patches and upgrading, etc. You can roll back snapshot disks to quickly recover the business after abnormality occurs.</p>

Custom image

<p><strong>Overview </strong></p> <p>Custom image refers to make operating system template through existing ECS, including Linux and Windows. It can install custom installment software on ECS, make images after modifying configuration files and use the custom image to directly create an ECS instead of reinstalling software and modifying configuration files.</p> <p><strong>Scenarios </strong></p> <p>Unified deployment of apps</p> <p>You can install corresponding app such as xx-web and change system configuration file after creating an ECS, then create a custom template xx-web-temp based on this ECS. You can choose xx-web-temp from the custom template to create an ECS instead of reinstalling software and modifying configuration files.</p> <p><strong>Standardize parameters standard configuration</strong></p> <p>Configure corresponding parameter based on app types such as tomcat startup parameter, java parameter, etc. Use the same custom template to create an ECS with consistent tomcat startup parameter and java parameter to avoid abnormality.</p> <p><strong>Quick deployment of apps </strong></p> <p>You can Install corresponding application software such as xx-web and modify system configuration file after creating an ECS. A custom template xx-web-temp will be created based on this ECS. You can create two ECSs to provide external service and quickly deploy several ECSs by using custom image xx-web-temp and making simple configuration as business expands.</p>

PingAn Hot_Patch

Did the above content solve your problem? Yes No
Please complete information!

Call us


Email us


Online customer service

Instant reply

Technical Support

cloud products