This article provides you with a quick reference to popular features of ECS resources.
Operation instructions and limits
To use an ECS instances, follow these steps:
Connect to the ECS instance. Use different methods according to its operating system:
- Use Management Terminal to connect to an ECS instance regardless of the operating system. Generally, this method is used for troubleshooting and maintenance.
- For Linux or Unix-like OS: See Connect to a Linux instance by using an SSH key pair or Connect to a Linux instance by using a password.
- For Windows OS: See Connect to a Windows instance.
You can change the instance type, IP addresses, and network bandwidth of your instance if the configurations cannot meet your business needs.
You can Change operating system if it does not meet your business needs.
You can convert a Pay-As-You-Go instance to a Subscription instance. For more information, see Switch from Pay-As-You-Go to Subscription.
You can use the following features to elaborate management of and control over ECS instances:
To use a cloud disk as a data disk, follow these steps:
Create a snapshot of a cloud disk to back up data.
When the capacity of the system disks or data disks cannot meet your business needs, you can increase system disk size or resize the data disks. For more information about resizing a data disk, see Linux _ Resize a data disk and Windows _ Resize a data disk.
When errors occur to data on a cloud disk, you can use a snapshot of the disk to restore data. For more information, see Roll back a cloud disk.
If you want to restore a cloud disk to its initial status after it is created, you can reinitialize a cloud disk.
If you want to copy data on an existing cloud disk to a new, empty cloud disk, you can create a cloud disk from a snapshot.
To use a snapshot, follow these steps:
Create a snapshot by using either of the following methods:
To save space occupied by snapshots, delete unnecessary snapshots.
Only custom images can be operated in the ECS console. Using custom images can simplify environment deployment.
You can own a custom image by using the following methods:
Copy a custom image across regions
Share a custom image across accounts
To use a security group, follow these steps:
To simplify business deployment, you can clone security groups across regions or network types.
When new security group rules impair the online business application, you can restore the rules fully or partially.
To use an SSH key pair, follow these steps:
To use an ENI, follow these steps:
Optional. Configure the ENI.
You can use tags to group resources to improve efficiency. To use tags, follow these steps: