Elastic Cloud Server

Notice for Use

2026-03-23 08:07:23

Elastic Cloud Server Usage Guidelines

  • Illegal Activities: The use of elastic cloud servers for any illegal activities is prohibited. This includes but is not limited to cyber attacks, hacking, illegal data acquisition, invasion of privacy, phishing, and the dissemination of malware.

  • Network Attacks: The use of elastic cloud servers for any form of cyber attacks is prohibited, such as Distributed Denial of Service (DDoS) attacks, port scanning, and unauthorized system intrusion.

  • Unauthorized Access: Prohibited from using elastic cloud servers to access, intrude, or infringe upon others' systems, networks, or data without authorization.

  • False Behavior: Prohibited from using elastic cloud servers for impersonation, data forgery, deception, or misleading others.

  • Resource Abuse: Prohibited from misusing elastic cloud server resources, including but not limited to maliciously occupying computing resources, sending spam, engaging in large-scale illegal advertising activities, etc.

  • Intellectual Property Infringement: Prohibited from using elastic cloud servers to infringe upon others' intellectual property, including illegal downloading, sharing, and distribution of copyrighted content.

  • Illegal Content: Prohibited from using elastic cloud servers to store, transmit, or publish any illegal, obscene, violent, hateful speech, or other content that violates moral standards.

  • Destructive Actions: Prohibited from using elastic cloud servers for destructive operations, such as disrupting the normal functioning of networks, servers, databases, or other computing devices.

  • Violation of Provider Policies: Prohibited from breaching the usage policies, terms of service, and contractual agreements of the selected cloud service provider.

Windows Operating System Usage Guidelines

  • Do not terminate system processes, as doing so may cause the server to crash or restart.

  • Do not rename, delete, or disable the Windows administrator account to avoid affecting server usage.

  • It is not recommended to modify the registry, as doing so may cause the system to fail to start. If you must modify it, please back up the registry before making changes.

  • It is not recommended to modify the server clock, as doing so may invalidate DHCP leases and result in IP loss.

  • Must back up IIS configuration files before modifying them. Use software that preserves file formatting to prevent corruption, which could render IIS unusable.

  • Do not delete the VMTool program, as it may cause an exception to the cloud server.

Linux Operating System Usage Guidelines

  • Do not modify the contents of the /etc/issue file; otherwise, the system distribution version of a custom image created from an instance will not be correctly recognized, and instances created with this image will not start properly.

  • Do not arbitrarily change the permissions of directories in the root directory partition, especially the permissions of directories such as /etc, /sbin, /bin, /boot, /dev, /usr, and /lib. Improper permission changes can cause the system to malfunction.

  • Do not modify the permissions or names of system directories, as this may cause the system to fail to operate or start normally.

  • Do not compile the Linux system kernel or perform any other operations on the kernel. It is not recommended to modify the system's default DNS SERVER (/etc/resolv.conf), as this may result in the inability to use software sources, NTP, and other services.

  • It is not recommended to modify the server's default internal network configuration information (IP, subnet mask, and gateway address), as this may lead to network anomalies.

  • Please use administrative accounts such as root cautiously when performing operations like fio, mkfs, fsck, and scale up to avoid data damage caused by accidental operations.


Rqzgz0t60Lwx