All Products
Search
Document Center

Elastic Compute Service:Create an instance on the Custom Launch tab

Last Updated:Jan 23, 2024

Compared with the Quick Launch tab on the Elastic Compute Service (ECS) instance buy page, the Custom Launch tab allows you to customize configurations such as the image types, instance types, storage, bandwidth, and security groups based on your business requirements to create instances. This topic describes how to create an instance on the Custom Launch tab.

Preparations

Create an Alibaba Cloud account and complete real-name verification.

Procedure

  1. Go to the instance buy page in the ECS console.

  2. Click the Custom Launch tab.

  3. Configure parameters such as Billing Method, Region, Instance Type, and Image as needed.

    For information about each parameter on the Custom Launch tab, see the Parameters section in this topic.

  4. Before you click Create Order, check the instance configurations in the Configuration Summary section and configure parameters such as Duration on the right side. Make sure that all configurations meet your business requirements.

  5. Read and select ECS Terms of Service and Refund Policies and Procedure, and then click Create Order.

    In most cases, it takes 3 to 5 minutes to create an instance. You can go to the Instances page in the ECS console to view the status of the instance. When the instance enters the Running state, the instance is created.

Parameters

Billing methods

Billing methods affect the billing and charging rules of instances. The resource status change rules of instances vary based on the instance billing method.

Billing method

Description

References

Subscription

A billing method that requires you to pay for and then use resources.

Subscription

Pay-as-you-go

A billing method that allows you to use resources first and pay for them afterward. The billing cycles of pay-as-you-go instances are accurate to the second. You can purchase and release instances on demand.

Note

We recommend that you use the pay-as-you-go billing method together with savings plans and reserved instances to reduce costs.

Preemptible Instance

A billing method that allows you to use resources first and pay for them afterward. You can place a bid for spare ECS capacity to create preemptible instances at discounts, compared with pay-as-you-go instances that do not have discounts. Preemptible instances may be automatically released due to fluctuations in market price or insufficient resources of instance types.

Preemptible Instance

Region

The geographic location where the ECS instances of the cluster are located. To ensure minimal network latency, select a region that is close to your geographical location. After the cluster is created, you cannot change the region. For more information, see Regions and zones.

Network and Zone

We recommend you to specify a virtual private cloud (VPC). VPCs are logically isolated from one another, work more securely, and support features such as Elastic IP Address (EIP), IPv6, and Elastic Network Interface (ENI).

A region consists of multiple isolated locations known as zones. Each zone has its own independent power supply and networks. Resources that are deployed within the same zone share the network and have minimal latency between each other. Services deployed within the same zone provide faster communication speeds, which translates into more efficient business operations.

Network type

Description

References

VPC

A VPC is an isolated network dedicated for your use. You have full control over your VPC. For example, you can specify a private CIDR block and configure route tables and gateways for the VPC.

If you have not created a VPC in the selected region, skip this step. The system creates a default VPC and vSwitch in that region.

Select an existing VPC and vSwitch. Alternatively, click Create VPC and Create vSwitch to create a VPC and vSwitch in the VPC console. After the VPC and vSwitch are created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of VPCs and vSwitches.

Note

If you want to assign an IPv6 address to the instance, select a VPC and a vSwitch that have an IPv6 CIDR block enabled.

Classic Network

Instances of the classic network type are deployed in the public infrastructure of Alibaba Cloud, and are planned and managed by Alibaba Cloud.

Note

If you purchase an ECS instance for the first time after June 16, 2016 12:00 (UTC +8), you cannot select a classic network.

Network Types

Instances & Images

Instance types and images define the basic attributes of an instance: basic resources such as vCPUs, memory, and operating systems.

Instance Type

Available instance types vary based on the selected region. You can go to the Instance Types Available for Each Region page to view the instance types available in each region.

You may have specific configuration requirements for the instance. For example, you may want the instance to have multiple ENIs bound, use enhanced SSDs (ESSDs), or use local disks. In this case, make sure that the selected instance type meets your business requirements. For more information about the features, supported scenarios, and metrics of instance types, see Overview of instance families.

If you set Billing Method to Preemptible Instance, configure the Instance Usage Duration and Highest Price per Instance parameters.

  • Instance Usage Duration specifies the protection period of a preemptible instance. After the protection period ends, the instance may be released due to insufficient resources or a lower bid than the market price.

    Value

    Description

    One Hour

    After a preemptible instance is created, it enters a 1-hour protection period during which it cannot be automatically released.

    None

    A preemptible instance is created without a protection period. Preemptible instances without a protection period are lower-cost than preemptible instances with a protection period.

  • Highest Price per Instance

    Value

    Description

    Use Automatic Bid

    The real-time market price of an instance type is automatically used. The price can be up to but cannot exceed the pay-as-you-go price of the instance type. Automatic bidding can prevent the preemptible instance from being released due to lower bids than the market price, but cannot prevent the instance from being released due to insufficient resources.

    Set Maximum Price

    You must specify a maximum price. If the real-time market price exceeds the maximum price or if resources are insufficient, the preemptible instance is released.

Image

Images contain information required to run instances. Alibaba Cloud provides a variety of image sources for easy access to images. The following table describes the image sources.

Image source

Description

References

Public Image

Public images are base images provided by Alibaba Cloud that are fully licensed. These images include Windows Server operating system images and mainstream Linux operating system images.

Note

If you select a g8y, c8y, or r8y YiTian instance type and an Alibaba Cloud Linux image, you can use the application acceleration feature to improve the performance of your instance. For more information, see Configure application acceleration for a YiTian instance.

Overview of public images

Custom Image

You can create or import custom images. Custom images contain initial system environments, application environments, and software configurations. This eliminates the need for repetitive manual configurations.

Overview of custom images

Shared Image

Shared images are custom images shared by other Alibaba Cloud accounts. You can use the images shared to you to create instances.

Share a custom image

Marketplace Image

The Alibaba Cloud Marketplace images are strictly reviewed and have a wide range of types. You can deploy cloud servers used in scenarios such as website construction and application development with one click.

Use Alibaba Cloud Marketplace images

Community Image

Community images are publicly available. You can publish custom images as community images for other users to obtain and use.

Community images

Storage

Instances provide storage capabilities based on the system disks, data disks, and Apsara File Storage NAS file systems that are attached to the instances. ECS provides cloud and local disks to meet the storage requirements of different scenarios.

  • Cloud disks include ESSDs, standard SSDs, and ultra disks and can be used as system disks or data disks. For more information, see Disks.

    Note

    The billing method of a cloud disk that is created along with an instance is the same as that of the instance.

  • Local disks can be used only as data disks. If an instance family (such as instance family with local SSDs and big data instance family) is equipped with local disks, information about the local disks is displayed. For more information, see Local disks.

    Note

    Local disks cannot be attached to instances on your own.

System Disk

System disks are used to install operating systems. The default capacity of a system disk is 40 GiB. However, the actual minimum capacity is related to the image type. The following table describes the capacity ranges of system disks for different images.

Image

System disk capacity range (GiB)

Linux (excluding FreeBSD and Red Hat)

[max{20, Image size}, 2,048]

FreeBSD

[max{30, Image size}, 2,048]

Red Hat

[max{40, Image size}, 2,048]

Windows

[max{40, Image size}, 2,048]

(Optional) Data Disk

Data disks are used to store application data. When you add a data disk, you can encrypt the disk to meet data security and regulatory compliance requirements. For more information about data encryption, see Overview of disk encryption.

Note

The number of data disks that can be attached to a single instance is limited. For more information, see the EBS limits section in the "Limits" topic.

(Optional) Snapshot

A snapshot is a point-in-time backup of a disk. You can quickly import data by creating a disk from a snapshot. You can use automatic snapshot policies to periodically back up disks to prevent risks such as accidental data deletion.

Select an existing snapshot policy or click Create Automatic Snapshot Policy to create an automatic snapshot policy on the Snapshots page. For more information, see Create an automatic snapshot policy. After an automatic snapshot policy is created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of automatic snapshot policies.

Important

You are charged for snapshots. For more information, see Snapshot.

(Optional) NAS File System

If you have a large amount of data to share among multiple instances, we recommend that you use NAS file systems to reduce costs in data copying and synchronization.

Select an existing NAS file system or click Create File System to create a NAS file system in the NAS console. For more information, see the "Create a general-purpose NAS file system in the NAS console" section in Create a file system. After a NAS file system is created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of NAS file systems. For more information about how to mount a NAS file system, see Mount NAS file systems when you purchase an ECS instance.

Bandwidths & Security Groups

You can make network and security group configurations to allow the instance to communicate with the Internet and other Alibaba Cloud resources and safeguard the instance on the network.

(Optional) Public IP Address

To enable the instance to access the Internet, you must assign a public IP address to the instance. You can select Assign Public IPv4 Address when you create an instance to have a public IP address automatically assigned to the instance. Alternatively, you can configure an EIP or a Network Address Translation (NAT) gateway after an instance is created to provide Internet access for the instance. You purchase an EIP and a NAT gateway separately as needed. For more information, see What is an Elastic IP Address? and What is NAT gateway?

Select Assign Public IPv4 Address and set Bandwidth Billing and Bandwidth or Peak Bandwidth.

For information about billing methods for public bandwidth usage, see Public bandwidth.

Bandwidth billing method

Description

Pay-by-bandwidth

You are charged based on a specified bandwidth value. The actual outbound public bandwidth is capped at the specified bandwidth value.

  • Pay-by-bandwidth is suitable for scenarios that require stable bandwidth.

  • If your instance communicates frequently with external networks and requires long-term use of bandwidth or if your instance has the public bandwidth utilization that is higher than 10%, we recommend that you select pay-by-bandwidth as the billing method for network usage.

Pay-by-traffic

You are charged based on the actual traffic volume. To prevent excessive fees that are caused by traffic bursts, you can specify a maximum bandwidth for outbound traffic.

  • Pay-by-traffic is suitable for scenarios in which bandwidth needs are highly variable.

  • If your instance has the public bandwidth utilization that does not exceed 10% and experiences occasional traffic spikes, we recommend that you select pay-by-traffic as the billing method for network usage.

Security Group

A security group is a virtual firewall that is used to control the inbound and outbound traffic of instances in the security group. For more information, see Overview of security groups.

If the selected VPC does not have a security group, the system automatically creates a default security group. The default security group allows inbound traffic over Secure Shell Protocol (SSH) port 22, Remote Desktop Protocol (RDP) port 3389, and Internet Control Message Protocol (ICMP). You can modify the security group configurations after the security group is created.

You can also select an existing security group or click Create Security Group to create a security group based on your business requirements. When you create a security group, you must configure Security Group Name, Security Group Type, and Open IPv4 Ports.

Note

For more information about how to configure a security group, see Create a security group.

(Optional) ENI

ENIs include primary ENIs and secondary ENIs. Primary ENIs cannot be unbound from instances. They can be created and released only along with instances. Secondary ENIs can be bound to or unbound from instances to allow traffic to be switched between instances. To create a secondary ENI when you create an instance, click add-nic and select a vSwitch to which the secondary ENI belongs.

Note

You can bind only one secondary ENI when you create an instance. You can also create secondary ENIs and bind them to an instance after the instance is created. For more information about the number of ENIs that can be bound to an instance of each instance type, see Overview of instance families.

(Optional) IPv6

After you enable IPv6, the public IPv4 address depletion issue is resolved, and a variety of devices can access the Internet.

Select Assign IPv6 Address Free of Charge. After you assign an IPv6 address, you must log on to the instance and configure an IPv6 address in the operating system to use the IPv6 address. For more information, see Configure an IPv6 address for a Windows instance or Configure an IPv6 address for a Linux instance.

(Optional) Management settings

The Management settings include the Logon Credential and Tag parameters for remote connection to instances and for easy retrieval and management of resources.

Logon Credential

Logon Credentials is used to securely log on to an instance. For more information about how to connect to the instance, see Connection method overview.

Logon Credential

Description

Key Pair

Note

You can use key pairs to log on to only Linux instances.

Select a username to use to log on to the instance. Then, select an existing key pair or click Create SSH Key Pair to create a key pair. After a key pair is created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of SSH key pairs. For more information, see Create an SSH key pair.

You can set Logon Username to root or ecs-user.

Warning

If you log on to the instance as the root user, you have the highest permissions on the instance. However, security risks may arise. We recommend that you use ecs-user instead to log on to the instance.

Password Preset in Image

Note

Only Custom Image and Shared Image support this authentication method.

To use the password preset in the selected image to log on to the instance, select this authentication method. If you want to select this option, make sure that your selected image has a password preset.

Custom Password

Enter and confirm a password. Then, set Logon Username.

  • For Linux instances, set Logon Username to root or ecs-user.

    Warning

    If you log on to the instance as the root user, you have the highest permissions on the instance. However, security risks may arise. We recommend that you use ecs-user instead to log on to the instance.

  • For Windows instances, a default value of administrator is used for Logon Username.

Set Later

After the instance is created, bind the key pair or reset the instance password. For more information, see Bind an SSH key pair and Reset the logon password of an instance.

Tag

Each Tag consists of a tag key and a tag value. You can add tags to resources that have identical characteristics, such as resources that belong to the same organization and resources that serve the same purpose. You can use tags to search for and manage resources in an efficient manner. For more information, see Overview of tags.

Select or create tags.

(Optional) Advanced Settings

Advanced Settings include Hostname, Instance Metadata, and User Data. They are used to customize the information displayed or usage of the instance in the console and operating system.

Parameter

Description

Instance Name, Description, Hostname, and Sequential Suffix

If you want to create multiple instances, you can set sequential instance names and hostnames to facilitate management. For more information about how to configure sequential instance names and hostnames, see Batch configure sequential names or hostnames for multiple instances.

Instance RAM role

An ECS instance can assume an instance RAM role to obtain the permissions of the role. Then, the instance can securely make API requests to specific Alibaba Cloud services and manage specific Alibaba Cloud resources based on the Security Token Service (STS) temporary credentials of the role.

Select an existing instance RAM role or click Create Instance RAM Role to go to the RAM console to create an instance RAM role. After an instance RAM role is created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of instance RAM roles. For more information, see Attach an instance RAM role to an ECS instance.

Metadata Access Mode

ECS instance metadata contains information about instances in Alibaba Cloud. You can view the metadata of running instances and configure or manage the instances based on their metadata. For more information about how to view instance metadata, see View instance metadata.

User Data

User data can be run as scripts on instance startup to automate instance configurations, or can be used as common data and passed into instances. For more information, see Manage the user data of Linux instances and Manage the user data of Windows instances.

In the User Data field, enter the user data that you prepared. If the user data is already encoded in Base64, select Enter Based64-encoded Content.

Resource Group

Resource groups allow you to manage resources across regions or across services based on your business requirements and manage the permissions of resource groups. For more information, see Resource groups.

Select an existing resource group, or click Create Resource Group to create a resource group in the Resource Management console. After a resource group is created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of resource groups. For more information, see Create a resource group.

Deployment Set

Deployment sets support the high availability strategy. After you apply the high availability strategy to a deployment set, all instances in the deployment set are distributed across different physical servers to ensure business availability and implement underlying disaster recovery.

Select an existing deployment set or click Deployment Sets to create a deployment set. After a deployment set is created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of deployment sets. For more information, see Create a deployment set.

Dedicated Host

A dedicated host is a cloud host whose physical resources are exclusively reserved for a single tenant. Dedicated hosts meet strict security compliance requirements and support bring your own license (BYOL) when you migrate services to Alibaba Cloud.

Select an existing dedicated host or click Create Dedicated Host to create a dedicated host. After a dedicated host is created, go back to the ECS instance buy page and click the refresh icon to obtain the most recent list of dedicated hosts. For more information, see Create a dedicated host.

Private Pool Type

After an elasticity assurance or a capacity reservation is created, the system generates a private pool to reserve resources for a specific number of instances that have specific attributes. During the validity period of the elasticity assurance or capacity reservation, you always have access to the resources reserved in the private pool when you want to create instances. For more information, see Overview of resource advisor.

Note

Only pay-as-you-go instances can be created from the resources reserved by elasticity assurances or capacity reservations.

  • Open: The capacity in open private pools is given priority over public pool resources. If no capacity is available in private pools, the system attempts to use public pool resources.

  • None: The capacity in private pools is not used.

  • Targeted: The system uses the capacity of a specified private pool or an open private pool to create instances. If no resource in the specific private pool or open private pool is available, instances cannot be created.

What to do next