Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is the knowledge of CVM ECS?

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)05/31 Report--

In this issue, the editor will bring you some knowledge about CVM ECS. The article is rich in content and analyzes and describes it from a professional point of view. I hope you can get something after reading this article.

CVM ECS

Elastic Compute Service (ECS) is a basic cloud computing service provided by Aliyun.

Aliyun proprietary network:

More business possibilities can be created on Aliyun's proprietary network.

More business possibilities can be created on Aliyun's proprietary network.

Aliyun's proprietary network is more stable and secure.

Stability.

Stability.

Vertical resilience, that is, configuration changes for a single server

For the elasticity of Ali Cloud, it is the elasticity of computing, the elasticity of storage, the elasticity of the network, and the flexibility of your re-planning of the business architecture.

Instance specification family, which can be divided into:

Case Specification Family for General Computing scenarios

Case Specification Family for memory Optimization scenario

Case Specification Family for Computational Optimization scenarios

Case Specification Family for Storage Optimization scenario

Case Specification Family for heterogeneous Computing scenarios

Case specification families for temporary usage scenarios

Transformation Logic between Specification families

Configurations can be changed between the three shared instance specification families (XN4, N4, MN4) and within the specification family.

Configurations can be changed between the three exclusive instance specification families (SN1, SN2, SE1) and within the specification family.

Configurations can be changed between the three computationally optimized specification families (C4, CM4, CE4) and within the specification family.

The configuration can be changed between the internal specifications of the heterogeneous computing GA1 specification family.

The configuration can be changed between the internal specifications of the heterogeneous computing GN4 specification family.

Configurations can be changed between the three shared instance specification families (N1, N2, E3) and within the specification family.

Two types of disks are supported in the Icano optimized instance:

SSD cloud disk

Super efficient cloud disk

The life cycle of an instance is from creation (purchase) to final release (prepaid instance expires, postpaid instance outage or postpaid instance downtime)

The instance user actively releases).

Bidding instance is a kind of on-demand instance specially designed to reduce the ECS computing cost of users.

Bidding instances are paid on an hourly basis, and the "pay later" model is adopted.

Cloud disks are divided into efficient cloud disks, SSD cloud disks and ordinary cloud disks.

The high efficiency cloud disk uses the mixed medium of solid state hard disk and mechanical hard disk as the storage medium.

SSD cloud disk makes use of distributed three-copy mechanism

The desired IOPS performance can only be achieved when the SSD cloud disk is mounted to an instance optimized by Igamot O. The desired IOPS performance cannot be achieved when mounted to an instance that is not optimized for Istroke O.

Ordinary cloud disks use mechanical disks as storage media

Chunk

ECS users' reading and writing to the virtual disk will eventually be mapped to the reading and writing of files on the Aliyun data storage platform. Aliyun provides a flat

Linear storage space, the linear address is sliced internally, and a slice is called a Chunk;. For each Chunk, Aliyun replicates.

Make three copies, and store these copies on different nodes in the cluster according to a certain strategy to ensure the reliability of user data.

The principle of three copies

In the Aliyun data storage system, there are three types of roles, called Master, Chunk Server, and Client.

1.Client calculates the Chunk corresponding to the write operation.

two. Client asks Master for the location of three copies of the Chunk.

3.Client issues write requests to the three Chunk Server based on the results returned by Master.

4. If all three are successful, Client returns success to the user; conversely, Client returns failure to the user.

As for the data loss caused by soft failures such as virus infection, human error deletion or hacker intrusion in the ECS instance, backup and snapshot should be used.

Technical means to solve the problem.

At present, as long as it is in the same region, SLB, RDS, OSS and ECS can be directly connected via private network.

Public network IP can be used in the following situations:

Mutual visit between ECS instance and Internet

Exchange of visits between ECS instances and cloud services

CVM ECS does not support multicast and broadcast

There are two types of public network IP for private network (VPC) ECS instances:

Public network PublicIP

Elastic public network IP (EIP)

The public network PublicIP is created or upgraded with the instance.

0Mbps bandwidth is automatically allocated by the system. After allocation, it cannot be unbound and can only be released with the instance.

If you need to retain a public network IP for a long time, you can bind and unbind it to the desired CVM. Select Elastic Public Network IP (EIP). Play

A sexual public network IP (EIP) can be applied separately, and can be bound to an instance that does not have a public network IP (PublicIP or EIP) assigned to it, or from the instance

Unbind, bind to another instance, and release it separately.

You can assign at most one public network IP to an ECS instance of a proprietary network type, either public network PublicIP or elastic public network IP.

PublicIP similarities and differences between proprietary Network and Classical Network

What they have in common: Internet can be accessed through PublicIP. All operations on the product are the same and purchased with the example

If you buy it, the bandwidth can be upgraded, cannot be unbound, and can be released with the instance.

Difference: the PublicIP of the proprietary network is NAT IP, which cannot be queried from the command line inside the machine; the classic network is Binding.

IP, which can be queried on the machine through the command line.

A security group is a logical grouping of instances that share the same security requirements and trust each other in the same Region.

Composition. Each instance belongs to at least one security group and needs to be specified when it is created. Network interconnection between instances in the same security group, with different security

The private network is not connected between the instances of the whole group by default. Mutual visits between the two security groups can be authorized.

Security group is a kind of virtual firewall with stateful inspection packet filtering function. Security groups are used to set network access control for single or multiple CVMs.

Which is an important means of network security isolation for dividing security domains in the cloud

There are a maximum of 100 security group rules per security group

Image is the template for the running environment of ECS instance of CVM, which generally includes operating system and pre-installed software

The so-called snapshot is the data backup of a disk at a certain point in time.

Snapshots can be divided into manual snapshots and automatic snapshots.

A snapshot chain is a relational chain of all snapshots in a disk, and each disk corresponds to a snapshot chain.

The above is the knowledge of ECS shared by the editor. If you happen to have similar doubts, please refer to the above analysis to understand. If you want to know more about it, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report