Step 1: Configure Basic Settings
Prerequisites
You have already signed up for cloud services, and your credit balance is sufficient. For details, see Registering on the HUAWEI CLOUD Management Console.
Switching to the ECS Creation Page
- Log in to the management console.
- Click
in the upper left corner and select the desired region and project. - Under Computing, click Elastic Cloud Server.
- Click Buy ECS. The page for purchasing ECSs is displayed.
SAP High-Performance Analytic Appliance (HANA) is a high-performance real-time data computing platform based on memory computing technologies. The public cloud provides high-performance IaaS services that comply with SAP HANA requirements. These services help users rapidly request for SAP HANA resources (such as applying for HANA ECSs and public IP addresses) and install and configure SAP HANA, therefore improving user operation efficiency, reducing operation costs, and enhancing user experience.
HANA ECSs are dedicated for SAP HANA. If you have deployed SAP HANA on cloud servers, you can purchase HANA ECSs.
For more information about HANA ECS application scenarios and purchasing methods, see SAP HANA User Guide.
Performing Basic Configurations
- Select a billing mode, Yearly/Monthly, Pay-per-use, or Spot price.
- In Yearly/Monthly billing mode, purchase an ECS configuration and set Required Duration. Then, the system deducts the fees incurred at one time from your account based on the service price.
Yearly/Monthly ECSs cannot be deleted. They support only resource unsubscription. If such an ECS is no longer used, switch to the Elastic Cloud Server page, click More in the Operation column of this ECS, and select Unsubscribe to unsubscribe it.
- In Pay-per-use billing mode, after purchasing an ECS configuration, you do not need to set Required Duration. Then, the system deducts the fees incurred from your account based on the service duration.
- In Spot price billing mode, your purchased ECS is billed based on the service duration at a lower price than that of a pay-per-use ECS with the same specifications. However, a spot price ECS may be reclaimed at any time based on the market price or changes in supply and demand. For more information about spot price ECSs, see "Spot Price ECSs".
- In Yearly/Monthly billing mode, purchase an ECS configuration and set Required Duration. Then, the system deducts the fees incurred at one time from your account based on the service price.
- Select a region.
ECSs in different regions cannot communicate with each other over an intranet. For low network latency and quick resource access, select the nearest region.
- Select an AZ.
An AZ is a physical region where power and networks are physically isolated. AZs in the same region can communicate with each other over an intranet.
- To enhance application availability, create ECSs in different AZs.
- To shorten network latency, create ECSs in the same AZ.
Random AZ allocation is available on the console when you create an ECS. The system will use a hash algorithm to select a default AZ based on your universally unique identifier (UUID).
The released ECS types and flavors vary depending on AZs. To view all supported ECS types and flavors on the cloud service platform, set AZ to Random. Then, the system automatically allocates an AZ according to your selected ECS flavor.
For example, S1 ECSs are released only in AZ 1; S2 ECSs are available in AZ 2 and AZ 3 and have been sold out in AZ 1. If you set AZ to Random, you can view both S1 and S2 ECSs. If you create an S1 ECS, the system automatically allocates it to AZ 1. If you create an S2 ECS, the system randomly allocates it to AZ 2 or AZ 3.
- Select a CPU architecture.
- x86
The x86-based CPU architecture uses Complex Instruction Set Computing (CISC). Each instruction can be used to execute low-level hardware operations. The number of instructions is large, and the length of each instruction is different. Therefore, executing such an instruction is complex and time-consuming.
- Kunpeng
The Kunpeng-based CPU architecture uses Reduced Instruction Set Computing (RISC). RISC is a microprocessor that executes fewer types of computer instructions but at a higher speed than CISC. RISC simplifies the computer architecture and improves the running speed. Compared with the x86-based CPU architecture, the Kunpeng-based CPU architecture has a more balanced performance and power consumption ratio. Kunpeng features high density, low power consumption, high cost-effectiveness.
- x86
- Set Specifications.
The public cloud provides various ECS types for different application scenarios. You can view released ECS types and flavors in the list. Alternatively, you can enter a flavor (such as c3) or specify vCPUs and memory size to search for the desired flavor.
Latest generation shows the types and flavors of newly released ECSs, and All generations show the types and flavors of all ECSs provided by the public cloud.
Maximum Price is available only when Spot price is selected. The options are Automatic and Manual.- Automatic is recommended, which uses the pay-per-use price as the highest price you are willing to pay for a spot price ECS.
- Manual requires you to set the upper price limit for a spot price ECS. The upper limit must be greater than or equal to the market price and less than or equal to the pay-per-use price.
- Before selecting an ECS type, learn the introduction and notes on each type of ECSs. For details, see ECS Types.
- When purchasing an ECS, you are not allowed to select sold-out CPU and memory resources.
- Local Disk: specifies the local storage of the physical host where the ECS is deployed. Only Hard Disk Driver (HDD) disks are supported. If the ECS of the selected type (such as Disk-intensive) uses local disks, the system automatically attaches the local disks to the ECS and displays the information of the local disks.
For example, if Local Disk is 3x1800 GB (HDD), three HDDs are attached to the ECS and the capacity of each HDD is 1800 GB.
- Select an image.
- Public image
A public image is a standard, widely used image. It contains an OS and preinstalled public applications and is available to all users. You can configure the applications or software in the public image as needed.
- Private image
A private image is an image available only to the user who created it. It contains an OS, preinstalled public applications, and the user's private applications. Using a private image to create ECSs removes the need to configure multiple ECSs repeatedly.
For instructions about how to create a private image, see Creating a Private Image.
You can also select an encrypted image. For details, see Encrypting Images.
- If you use a full-ECS image to create an ECS, the EVS disks associated with the full-ECS image do not support the function of creating disks using a data disk image.
- If a full-ECS image is in Normal state and the system displays message "Available in AZx", the full-ECS image can be used to create ECSs in this AZ only, and the encryption attributes of the system and data disks of the created ECSs are the same as those of the system and data disks specified in the full-ECS image. Additionally, the SCSI, sharing attribute, and data encryption settings of the system and data disks cannot be modified during ECS creation.
- If a full-ECS image is in Normal state but the system does not display message "Available in AZx", the full-ECS image can be used to create ECSs in the entire region, and the encryption attributes of the system and data disks of the created ECSs are the same as those of the system and data disks specified in the full-ECS image. Additionally, the SCSI, sharing attribute, and data encryption settings of data disks can be modified during ECS creation.
- To ensure that NIC multi-queue is enabled on an ECS created using a private image, configure NIC multi-queue when creating such a private image. NIC multi-queue routes NIC interrupt requests among multiple vCPUs for higher network PPS and bandwidth.
For details, see How Do I Set NIC Multi-Queue Feature of an Image?
- Shared image
- Marketplace image
This parameter is available only when Billing Mode is set to Yearly/Monthly or Pay-per-use. Marketplace images are high-quality third-party images that have OSs, application environments, and software preinstalled. You can use the images to deploy websites and application development environments with a few clicks, and no additional configuration operation is required. Marketplace images support only yearly/monthly and pay-per-use ECSs.
If you use a Marketplace image, after you click Marketplace image, the system displays Marketplace images for you to select. For example, if the image product is name1 (test_001), name1 is the image name, and test_001 is the product name. You can search for your desired Marketplace image by image name or product name. Alternatively, you can click the image name to view more information about the image.
- Public image
- (Optional) Enable Host Security.
When using certain public images, select HSS provided by the public cloud. HSS is designed to improve the overall security for ECSs. It reduces intrusion risks with asset management, vulnerability management, intrusion detection, and baseline inspection functions.
To enable HSS, select Enable for Host Security and select an HSS version.
- Basic: This edition is free of charge. It supports intrusion detection to protect your account against brute-force attacks and abnormal logins, and supports security configuration to authenticate logins using password and SMS/email.
- Enterprise: This edition must be paid. It supports asset management, vulnerability management, unsafe settings check, intrusion detection, security operations, and security configuration.
After you enable HSS, the system automatically installs the HSS agent, enables account cracking prevention, and offers host security functions.
HSS provides basic, enterprise, premium, and WTP editions. Switch between these editions on the HSS management console. For details about the differences between versions, see Editions.
- Set System Disk, and Data Disk if required. Disks are classified as EVS disks and DSS disks based on whether the storage resources used by the disks are dedicated. DSS disks allow you to use dedicated storage resources.
- If you have requested for a storage pool on the DSS page, click the DSS tab and create disks in the obtained storage pool.
- If you have not requested for a dedicated storage pool, click the Disks tab and create EVS disks that use public storage resources.
- When you use DSS resources to create a disk, the disk type must be the same as that of the requested storage pool. For example, both are of high I/O type.
- For more information about DSS, see Dedicated Distributed Storage Service User Guide.
- System disk
For the disk types supported by an ECS, see Disk Types and Disk Performance.
- If the image based on which an ECS is created is not encrypted, the system disk of the ECS is not encrypted. If the image based on which an ECS is created is encrypted, the system disk of the ECS is automatically encrypted. For details, see (Optional) Encryption-r....
- For a P1 or P2 ECS, the system disk must be greater than or equal to 15 GB. It is recommended that the system disk be greater than 40 GB. A disk size must be an integer multiple of 10, for example, 60 GB or 70 GB. Otherwise, the system automatically rounds the value down, for example, 60 GB for value 68.
- Data disk
You can create multiple data disks for an ECS and enable sharing and encryption for each data disk. When creating an ECS, you can add up to 24 disks with customized sizes to it. After the ECS is created, you can add up to 60 disks to such a newly created ECS.
- SCSI: indicates that the device type of the data disk is SCSI. For more information about SCSI disks and the ECSs that can be attached with SCSI disks, see Device Types and Usage Instructions.
- Share: indicates that the EVS disk is sharable. Such an EVS disk can be attached to multiple ECSs.
- Encryption: indicates that the data disk is encrypted. For details, see (Optional) Encryption-r....
- Create Disk from Data Disk Image: If you have created a data disk image on the Image Management Service page, when using a Windows or Linux image to create an ECS, you can use the data disk image to create data disks for the ECS.
Click Create Disk from Data Disk Image. In the dialog box that is displayed, select your data disk image.
- One data disk image can be used for one data disk only.
- When you use a data disk image to create a disk, SCSI, Encryption, and Share are unavailable.
- For instructions about how to create a data disk image, see Image Management Service User Guide.
- (Optional) Encryption-related parameters
To enable encryption, click Create Xrole to grant KMS access rights to EVS. If you have rights granting permission, grant the KMS access rights to EVS. If you do not have the permission, contact the user having the security administrator rights to grant the KMS access rights. For more details, see Who Can Use the Encryption Feature?
- Encrypted: indicates that the EVS disk has been encrypted.
- Create Xrole: grants KMS access rights to EVS to obtain KMS keys. After the rights are granted, follow-up operations do not require granting rights again.
- KMS Key Name: specifies the name of the key used by the encrypted EVS disk. By default, the name is evs/default.
- Xrole Name: EVSAccessKMS: specifies that rights have been granted to EVS to obtain KMS keys for encrypting or decrypting EVS disks.
- KMS Key ID: specifies the ID of the key used by the encrypted data disk.
If you detach the system disk purchased when you buy a yearly/monthly ECS and want to continue using it as a system disk, you can only attach it to the original ECS. If you want to use it as a data disk, you can attach it to any ECS.
If you detach the non-shared data disk purchased when you buy a yearly/monthly ECS and want to attach it again, you can only attach it to the original ECS as a data disk.
The data disk purchased when you buy a yearly/monthly ECS does not support separate renewal, unsubscription, automatic service renewal, conversion to pay-per-use payment, and release.
- Click Next: Configure Network.
Last Article: Overview
Next Article: Step 2: Configure Network
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.