Elastic Cloud Server

Relationships between ECS and Other Services

2026-03-23 08:30:26

ECS Relationships with Others Cloud Services

ECS Relationships with Others Cloud Services

Service    Name

Cloud    server Relationships with    Others Services

Related    Content

Image

Images   provide the necessary information to run   cloud servers, including the   operating system, initial application   data, and so on. You can use an image   to create an elastic cloud   server, which enhances the deployment efficiency   of the elastic cloud   server.

For details, see Image Overview


Public   Images

The   basic images provided by eSurfing Cloud (a   cloud service provider) are all   licensed and authorized, covering   Windows Server system images and mainstream   Linux system images. Using   public images for cloud servers can reduce   security risks and   vulnerabilities. At the same time, users can obtain a   system   environment or software consistent with the instance by using public     images, thus avoiding complex server configuration issues and achieving     immediate use upon deployment.

For details, see Image Overview->Public Image Documentation

Private   Image

Users   can create or import their own images that   include initial system   environments, application environments,   software configurations, and other   information, which can save time on   repetitive configurations. Using private   images for cloud servers   allows for a high degree of flexibility in   configuration, meeting   users' personalized needs.

For details, see Image Overview->Private Image Documentation

Shared   Image

Private   images shared by other users. Using shared   images in cloud servers allows   users to share and reuse pre-configured   templates of operating systems and   software environments, eliminating   the need for repetitive operations and   configuration work. When one   user creates an image that meets specific   requirements, other users   can quickly obtain the same configuration   environment through sharing,   which improves deployment efficiency and   maintains consistency.

For details, see Image Overview->Shared Image Documentation

Security   Product Image

Security   product images are used to load some   security product services. You can   select the security product image   in the Cloud Server Console under Create   Cloud Server -> Image Type   to meet the security requirements for loading   security products such   as CSSP, DAS, LAS, OSM, etc.

For details, see Security Product Image   Documentation

EVS

A   block-level block storage product that uses a   distributed triple-replication   mechanism to provide data reliability   assurance for cloud servers. Elastic   Volume Service can be mounted to   elastic cloud servers and the capacity of   Elastic Volume Service can   be expanded.

For details, see Elastic   Volume Service   Documentation

Snapshot

A   backup file of the cloud server's status at a   certain point in time, used for   backing up or restoring the entire   cloud server. A snapshot captures the data   of a Elastic Volume Service   at a particular moment. By rolling back, the data   of the Elastic   Volume Service can be restored to the point in time when the   snapshot   was taken. Users can quickly create multiple Elastic Volume Services     with the same data for business deployment through snapshots.

For details, see Snapshot Documentation

CSBS

Provides   backup protection services for data on   elastic cloud servers. Supports   backing up all Elastic Cloud Servers   (system disks and data disks) within an   elastic cloud server, and uses   the backup data to restore the data of the   elastic cloud server. When   a cloud server or disk fails or data is mistakenly   deleted due to   human error, you can quickly recover the data by yourself.

For details, see Cloud Server Backup   Documentation

VPC

A   custom private network created on eSurfing Cloud   offers an isolated private   network for elastic cloud servers, where   you can also set up security groups,   IP ranges, bandwidth, and other   network features within the VPC.
    Users can easily manage and configure internal networks through VPC,   allowing   for secure and fast network changes. At the same time, users   can customize   access rules between elastic cloud servers within and   between security groups   to enhance the security protection of elastic cloud   servers.

For details, see VPC   Documentation

ENI

An   independent virtual NIC used to connect cloud   servers with a private network.   It can be added to or removed from   cloud servers to achieve flexible   expansion and migration of services.

For details, see Elastic NIC Documentation

Security   Group

Provides   a network security protection mechanism   for cloud servers to prevent   unauthorized access and protect computer   networks from malicious attacks. It   is a virtual firewall, used to   restrict inbound and outbound network traffic.   Users can define   various access rules within a security group, and once the   elastic   cloud server is added to this security group, it is protected by   these   access rules.

For details, see Security Documentation

Autoscaling

Autoscaling   can automatically adjust the number of   cloud servers, and can scale the   elastic cloud servers according to   the scaling configuration and scaling   strategy you define, helping you   save resources and operational costs.

For details, see Autoscaling   Documentation

LB

It   automatically distributes access traffic to   multiple elastic cloud servers,   enhancing the service capability of   the application systems built on elastic   cloud servers and improving   the fault tolerance of the applications.

For details, see Load Balancing Documentation

Cloud   Eye Service

Cloud   Eye provides monitoring services for cloud   servers, offering features such as   performance metric monitoring,   automatic alerts, and historical information   queries. Once users have   activated their elastic cloud servers, they can view   the status of the   corresponding service instances in Cloud Eye without the   need to   install additional plugins.

For details, see Cloud   Eye Documentation

Log   Auditing Service

The Log   Auditing Service conducts comprehensive   standardized processing of cloud   server logs to promptly discover   various security threats and abnormal   behavior events.

For details, see Log Auditing Documentation

 


NHRvTBphLTog