This topic provides the API reference of Alibaba Cloud Elastic Compute Service (ECS). If you are familiar with Web service and one or more programming languages, we recommend that you use APIs to manage your ECS resources or develop applications. For more information, see API overview.
We set limits on the number and specification for the ECS instance, disk, security group, snapshot, and network bandwidth that you can create. For more information, see Limits. Whenever the API description, optional parameter values, and available specifications conflict with the resource or specification limits described in the Limits, the Limits topic always takes the precedence.
We allow HTTP or HTTPS requests, and so are the methods GET or POST. You can make a request by using the following approaches:
In particular, you can skip the authentication process by using the SDK, CLI, and API Explorer. It is easier for you to get started by using the language-specific SDK instead of making a request over HTTP or HTTPS. For more information, see Developer Resources.
Note: When you call API in the Alibaba Cloud CLI and SDK, remove the period (.) from the request parameters that contain periods (.). For example, use
|Region||A specific data center established by Alibaba Cloud in which you can run your business. To decrease network latency, we have linked the regions all over the world. However, the region cannot be changed once an ECS resource is create in it.|
|Availability zone||Zone for short. An area with independent power grids and networks in a specified region. Each region has one or more zones. The network latency for ECS resources within a specific zone is reduced.|
|Instance||A virtual computing environment that includes CPU, memory, operating system, bandwidth, disks, and other basic computing components. An ECS instance is an independent virtual machine, and is the core element of ECS. For more information, see Instance type families.|
|Image||A running environment template for an instance. It includes an operating system and preinstalled software. You can use an image either to create an instance or change the system disk of an instance.|
|Disk||The storage device of instances.|
|Security group||An instance-related security group. An instance must belong to at least one security group. The security policies of a security group apply to all instances in the group.|
|Snapshot||A restore point created for a disk. It contains the disk data at a specified time and can be used to restore disk data or create custom images.|
|Tag||Consists of a key-value pair. You can assign tags to ECS resources for fast listing and filtering.|
|IP address||The Internet or intranet IP address of an instance.|