In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
In this issue, the editor will bring you some knowledge about CVM ECS. The article is rich in content and analyzes and describes it from a professional point of view. I hope you can get something after reading this article.
CVM ECS
Elastic Compute Service (ECS) is a basic cloud computing service provided by Aliyun.
Aliyun proprietary network:
More business possibilities can be created on Aliyun's proprietary network.
More business possibilities can be created on Aliyun's proprietary network.
Aliyun's proprietary network is more stable and secure.
Stability.
Stability.
Vertical resilience, that is, configuration changes for a single server
For the elasticity of Ali Cloud, it is the elasticity of computing, the elasticity of storage, the elasticity of the network, and the flexibility of your re-planning of the business architecture.
Instance specification family, which can be divided into:
Case Specification Family for General Computing scenarios
Case Specification Family for memory Optimization scenario
Case Specification Family for Computational Optimization scenarios
Case Specification Family for Storage Optimization scenario
Case Specification Family for heterogeneous Computing scenarios
Case specification families for temporary usage scenarios
Transformation Logic between Specification families
Configurations can be changed between the three shared instance specification families (XN4, N4, MN4) and within the specification family.
Configurations can be changed between the three exclusive instance specification families (SN1, SN2, SE1) and within the specification family.
Configurations can be changed between the three computationally optimized specification families (C4, CM4, CE4) and within the specification family.
The configuration can be changed between the internal specifications of the heterogeneous computing GA1 specification family.
The configuration can be changed between the internal specifications of the heterogeneous computing GN4 specification family.
Configurations can be changed between the three shared instance specification families (N1, N2, E3) and within the specification family.
Two types of disks are supported in the Icano optimized instance:
SSD cloud disk
Super efficient cloud disk
The life cycle of an instance is from creation (purchase) to final release (prepaid instance expires, postpaid instance outage or postpaid instance downtime)
The instance user actively releases).
Bidding instance is a kind of on-demand instance specially designed to reduce the ECS computing cost of users.
Bidding instances are paid on an hourly basis, and the "pay later" model is adopted.
Cloud disks are divided into efficient cloud disks, SSD cloud disks and ordinary cloud disks.
The high efficiency cloud disk uses the mixed medium of solid state hard disk and mechanical hard disk as the storage medium.
SSD cloud disk makes use of distributed three-copy mechanism
The desired IOPS performance can only be achieved when the SSD cloud disk is mounted to an instance optimized by Igamot O. The desired IOPS performance cannot be achieved when mounted to an instance that is not optimized for Istroke O.
Ordinary cloud disks use mechanical disks as storage media
Chunk
ECS users' reading and writing to the virtual disk will eventually be mapped to the reading and writing of files on the Aliyun data storage platform. Aliyun provides a flat
Linear storage space, the linear address is sliced internally, and a slice is called a Chunk;. For each Chunk, Aliyun replicates.
Make three copies, and store these copies on different nodes in the cluster according to a certain strategy to ensure the reliability of user data.
The principle of three copies
In the Aliyun data storage system, there are three types of roles, called Master, Chunk Server, and Client.
1.Client calculates the Chunk corresponding to the write operation.
two. Client asks Master for the location of three copies of the Chunk.
3.Client issues write requests to the three Chunk Server based on the results returned by Master.
4. If all three are successful, Client returns success to the user; conversely, Client returns failure to the user.
As for the data loss caused by soft failures such as virus infection, human error deletion or hacker intrusion in the ECS instance, backup and snapshot should be used.
Technical means to solve the problem.
At present, as long as it is in the same region, SLB, RDS, OSS and ECS can be directly connected via private network.
Public network IP can be used in the following situations:
Mutual visit between ECS instance and Internet
Exchange of visits between ECS instances and cloud services
CVM ECS does not support multicast and broadcast
There are two types of public network IP for private network (VPC) ECS instances:
Public network PublicIP
Elastic public network IP (EIP)
The public network PublicIP is created or upgraded with the instance.
0Mbps bandwidth is automatically allocated by the system. After allocation, it cannot be unbound and can only be released with the instance.
If you need to retain a public network IP for a long time, you can bind and unbind it to the desired CVM. Select Elastic Public Network IP (EIP). Play
A sexual public network IP (EIP) can be applied separately, and can be bound to an instance that does not have a public network IP (PublicIP or EIP) assigned to it, or from the instance
Unbind, bind to another instance, and release it separately.
You can assign at most one public network IP to an ECS instance of a proprietary network type, either public network PublicIP or elastic public network IP.
PublicIP similarities and differences between proprietary Network and Classical Network
What they have in common: Internet can be accessed through PublicIP. All operations on the product are the same and purchased with the example
If you buy it, the bandwidth can be upgraded, cannot be unbound, and can be released with the instance.
Difference: the PublicIP of the proprietary network is NAT IP, which cannot be queried from the command line inside the machine; the classic network is Binding.
IP, which can be queried on the machine through the command line.
A security group is a logical grouping of instances that share the same security requirements and trust each other in the same Region.
Composition. Each instance belongs to at least one security group and needs to be specified when it is created. Network interconnection between instances in the same security group, with different security
The private network is not connected between the instances of the whole group by default. Mutual visits between the two security groups can be authorized.
Security group is a kind of virtual firewall with stateful inspection packet filtering function. Security groups are used to set network access control for single or multiple CVMs.
Which is an important means of network security isolation for dividing security domains in the cloud
There are a maximum of 100 security group rules per security group
Image is the template for the running environment of ECS instance of CVM, which generally includes operating system and pre-installed software
The so-called snapshot is the data backup of a disk at a certain point in time.
Snapshots can be divided into manual snapshots and automatic snapshots.
A snapshot chain is a relational chain of all snapshots in a disk, and each disk corresponds to a snapshot chain.
The above is the knowledge of ECS shared by the editor. If you happen to have similar doubts, please refer to the above analysis to understand. If you want to know more about it, you are welcome to follow the industry information channel.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.