We use our own and third party cookies to improve your experience and our services, identifying your Internet browsing preferences on our website. If you continue to browse, we consider that you accept the use. You can find more information in our cookies policy.

Telefonica Background

A web-based management console is provided for you to flexibly obtain and release ECSs that work out of the box.

ECS has the following features:

  • Rapid deployment: An ECS can be provisioned to a user in only a few minutes, meeting urgent user requirements.
  • Easy management: Users can use the web-based console or open APIs to manage one or thousands ECSs.
  • Flexibility: Users can modify the specifications and bandwidths of ECSs in real time to improve resource utilization.
  • Full control: Users are granted the administrator or root user access permission for their own ECSs to fully control these ECSs.
  • Security and reliability: Multiple security technologies, such as resource isolation, network separation, and security groups, are employed to protect ECSs from viruses, Trojans, and DDoS attacks. 
  • Multiple ECS types: You can select ECSs of different types (Elastic purpose, compute-I, compute-II, memory-optimized) and different specifications (CPUs and memory) to suit your service requirements.
  • Multiple disk types: You can attach EVS disks of different types (common, high, and ultra-high I/O) to your ECSs. One ECS can have a maximum of 10 data disks attached, with the maximum capacity of 32 TB for each, thereby meeting your requirements in different scenarios.
  • Various images: Images of various models are provided to help you rapidly deploy OSs and software on ECSs. 
    • Public image: contains a standard OS image and preset public applications and is visible to all users. You can configure the application environment and required software to customize a public image.
    • Private image: contains an OS, preset public applications, and a user's private applications, and is visible to only one user. A private image is created from an ECS. A private image frees you from repeatedly configure ECSs when you create ECSs.
  • Public and private IP addresses: Each ECS can be assigned public and private IP addresses. A public IP address allows the ECS to connect to the Internet, and a private IP address allows the ECS to communicate with other ECSs on the internal network. Each ECS can have a maximum of 12 NICs attached. Each NIC can be configured in a different subnet and have an IP address assigned.
  • VPC: Each ECS can be added to a VPC, which facilitates internal network management and configuration and allows you to implement secure and quick network changes. In addition, you can configure security groups in the VPC and define access rules for VMs between security groups, thereby enhancing VM security. 
  • Login security: You can log in to an ECS using either a password or certificate.
  • OS reinstallation: If the ECS OS malfunctions due to misoperations, attacks, or data tampering, you can reinstall it to make it provide services again.
  • Auto scaling (AS): This feature allows ECSs to automatically scale in or out based on service requirements. You can customize scaling configurations and policies to both meet service requirements and reduce resource consumption.
  • Cloud Eye (CES): Open Cloud monitors ECSs and related resources to provide multiple alarm reporting modes and issue warnings in a timely manner, thereby escorting your ECSs.
  • Support for APIs: You can send HTTP/HTTPS requests for invoking Open Cloud APIs to manage your ECSs, thereby flexibly perform operations on your resources in a rapid, accurate, timely manner.
  • 100 VM instances can be started / stopped at once.
Category Function Description
Basic functions  Creating one or more ECSs in a batch You can create one or more ECSs at a time.
Starting one or more ECSs in a batch You can stop one or more ECSs at a time and then start them.
Restarting one or more ECSs in a batch If one or more ECSs fail to run properly, you can restart them at a time to restore them to a normal state.
Deleting one or more ECSs in a batch You can delete one or more unwanted ECSs at a time.
Support for multiple NICs An ECS can have a maximum of 12 NICs configured.
Support for multiple login methods You can log in to an ECS using either a password or certificate.
Support for file injection You can inject executable scripts or other files to an ECS during ECS creation to facilitate setup.
Resetting passwords If you forget the password for logging in to a Linux ECS, you can reset the password.
Reinstalling the OS You can reinstall the ECS operating system (OS) using the original image.
Image Custom image You can convert an ECS into an image that is available in the whole region.
Basic image You can choose different types of images. For details, see the IMS Product Description.
Storage EVS You can create EVS disks of common, high, and ultra-high I/O types. Each ECS can have a maximum of 10 data EVS disks attached. For details, see the EVS Product Description.
Network security VPC You can create VPCs and security groups, bind elastic IP addresses to ECSs. For details, see the VPC Product Description.
Backup VBS For details, see the VBS Product Description.
Monitoring Cloud Eye (CES) For details, see the CES Product Description.
Management AS For details, see the AS Product Description.