Help Center> > Getting Started >Purchasing and Logging In to a Windows ECS

Purchasing and Logging In to a Windows ECS

Scenarios

ECSs are more cost-effective than physical servers. Within minutes, you can obtain ECS resources from the public cloud. ECS resources are flexible and on-demand. This section describes how to purchase an ECS.

Step 1: Purchase an ECS

Step 2: Log In to the ECS

Notes

Dedicated physical resources

To run an ECS on isolated physical hardware, apply for a Dedicated Computing Cluster (DCC) before creating the ECS.

For details about DCC, see Dedicated Computing Cluster User Guide.

Step 1: Purchase an ECS

  1. Log in to the management console.
  2. Click in the upper left corner and select the desired region and project.
  3. Under Computing, click Elastic Cloud Server.
  4. Click Buy ECS.
    The ECS purchasing page is displayed.
    NOTE:

    SAP High-Performance Analytic Appliance (HANA) is a high-performance real-time data computing platform based on memory computing technologies. The public cloud provides high-performance IaaS services that comply with SAP HANA requirements. These services include applying for HANA ECSs and public IP addresses as well as installing and configuring SAP HANA. Such services facilitate applications on the public cloud platform of resources required by SAP HANA, improving the efficiency of user operations, reducing operation costs, and enhancing user experience.

    HANA ECSs are dedicated for SAP HANA. If you have deployed SAP HANA on cloud servers, you can purchase HANA ECSs.

    For more information about HANA ECS application scenarios and purchasing methods, see SAP HANA User Guide.

  5. Select a billing mode, Yearly/Monthly, Pay-per-use, or Spot price.
    • In Yearly/Monthly billing mode, purchase an ECS configuration and set Validity Period. Then, the system deducts the fees incurred at one time from your account based on the service price.
      NOTE:

      Yearly/Monthly ECSs cannot be deleted. They support only resource unsubscription. If an ECS is no longer used, switch to the Elastic Cloud Server page, click More in the Operation column of this ECS, and select Unsubscribe to unsubscribe it.

    • In Pay-per-use billing mode, after purchasing an ECS configuration, you do not need to set Validity Period. Then, the system deducts the fees incurred from your account based on the service duration.
    • In Spot price billing mode, your purchased ECS is billed based on the service duration at a lower price than that of a pay-per-use ECS with the same specifications. However, a spot ECS may be reclaimed at any time based on the market price or changes in supply and demand. For more information about spot ECSs, see section Spot ECSs.
  6. Select a region.

    ECSs in different regions cannot communicate with each other over an intranet. For low network latency and quick resource access, select the nearest region.

  7. Select an AZ.

    An AZ is a physical region where power and networks are physically isolated. AZs in the same region can communicate with each other over an intranet.

    • To enhance application availability, create ECSs in different AZs.
    • To shorten network latency, create ECSs in the same AZ.
  8. Set Specifications.

    The public cloud provides various ECS types for different application scenarios. You can view released ECS types and specifications in the list. Alternatively, you can enter a flavor (such as c3) or specify vCPUs and memory size to search for the desired flavor.

    Latest generations show the types and specifications of newly released ECSs, and All generations show the types and specifications of all ECSs provided by the public cloud.

    Quoting Mode is available only when Spot price is selected. The options are Automatic and Manual.
    • Automatic is recommended, which uses the pay-per-use price as the highest price you are willing to pay for a spot ECS.
    • Manual requires you to set the upper price limit for a spot ECS. The upper limit must be greater than or equal to the market price and less than or equal to the pay-per-use price.
    NOTE:
    • Before selecting an ECS type, learn the introduction and notes on each type of ECSs. For details, see section ECS Types.
    • When purchasing an ECS, you are not allowed to select sold-out CPU and memory resources.
    • Local Disk: specifies the local storage of the physical host where the ECS is deployed. Only Hard Disk Driver (HDD) disks are supported. If the ECS of the selected type (such as Disk-intensive) uses local disks, the system automatically attaches the local disks to the ECS and displays the information of the local disks.

      For example, if Local Disk is 3x1,800 GB (HDD), three HDDs are attached to the ECS and the capacity of each HDD is 1800 GB.

  9. Click Image.
    • Public image

      A public image is a standard, widely used image. It contains an OS and preinstalled public applications and is available to all users. You can configure the applications or software in the public image as needed.

      When you select certain public images, you are advised to use the Host Security Service (HSS) provided by the public cloud. HSS supports two-factor authentication for logins, account cracking prevention, and weak password detection to protect your ECSs against brute force attacks. To enable HSS, select HSS Basic. Then, the system automatically installs the HSS agent, enables account cracking prevention, and offers basic host security functions.

      NOTE:

      HSS Basic is available only in the CN South-Shenzhen region and will be provided for other regions later.

    • Private image

      A private image is an image available only to the user who creates it. It contains an OS, preinstalled public applications, and the user's private applications. Using a private image to create ECSs removes the need to configure multiple ECSs repeatedly.

      You can also select an encrypted image. For details, see Image Management Service User Guide.

      If you have used a CSBS backup to create a private image (full-ECS image), you can use the full-ECS image. However, the EVS disk in the image does not support disk creation using a data disk image, and disk attributes (such as SCSI/VBD and data encryption) cannot be modified. The ECSs created using a full-ECS image do not support DSS disks. For more details about how to use CSBS backups to create images, see section "Using Backups to Create Images" in Cloud Server Backup Service User Guide and section "Creating a Full-ECS Image Using a CSBS Backup" in Image Management Service User Guide.

    • Shared image

      A shared image is a private image shared by another user.

    • Marketplace image

      The Marketplace is a store where you can purchase third-party images that have the OS, application environment, and software pre-installed. You can use the images to deploy websites and application development environments with a few clicks, and no additional configuration operation is required.

      If you use a Marketplace image, after you click Marketplace image, the system displays Marketplace images for you to select. For example, if the image product is name1 (test_001), name1 is the image name, and test_001 is the product name. You can search for your desired Marketplace image by image name or product name. Alternatively, you can click the image name to view more information about the product.

  10. Set Disk.
    Disks are classified as EVS disks and DSS disks based on whether the storage resources used by the disks are exclusive. DSS disks allow you to use exclusive storage resources.
    • If you have applied for a storage pool on the DSS page, click the DSS tab and create disks in the obtained storage pool.
    • If you have not applied for an exclusive storage pool, click the Disks tab and create EVS disks that use public storage resources.
      NOTE:
      • When you use DSS resources to create a disk, the disk type must be the same as that of the requested storage pool. For example, both are of high I/O type.
      • For more information about DSS, see Dedicated Distributed Storage Service User Guide.

    A disk can be a system disk or a data disk. When creating an ECS, you can add up to 24 disks with customized sizes to it. After the ECS is created, you can add up to 60 disks to such a newly created ECS. The system disk size of a P1 or P2 ECS must be greater than or equal to 15 GB. It is recommended that the system disk size be greater than 40 GB.

    • System Disk

      If the image based on which an ECS is created is not encrypted, the system disk of the ECS is not encrypted. In addition, Unencrypted is displayed for the system disk on the page. If the image based on which an ECS is created is encrypted, the system disk of the ECS is automatically encrypted. For details, see section (Optional) Encryption-related parameters.

    • Data Disk

      You can create multiple data disks for an ECS and configure sharing and encryption for each data disk.

      • SCSI: indicates that the device type of the data disk is SCSI. For more information about SCSI disks and the ECSs that can be attached with SCSI disks, see section Block Storage.
      • Share: indicates that the EVS disk is shared. Such an EVS disk can be attached to multiple ECSs.
      • Encryption: indicates that the data disk is encrypted. For details, see section (Optional) Encryption-related parameters.
      • Create Disk from Data Disk Image: If you have created a data image on the Image Management Service page, when using a Windows or Linux image to create an ECS, you can use a data disk image to create a disk for the ECS.

        Click Create Disk from Data Disk Image. In the dialog box that is displayed, select your data image.

        NOTE:
        • One data disk image can be used only for one data disk.
        • When you use a data disk image to create a disk, SCSI, Encryption, and Share are unavailable.
        • For instructions about how create a data image, see Image Management Service User Guide.
    • (Optional) Encryption-related parameters

      To enable encryption, click Create Xrole to grant KMS access rights to EVS. If you have rights granting permission, grant the KMS access rights to EVS. If you do not have the permission, contact the user having the security administrator rights to grant the KMS access rights. For details, see section Who Can Use the Encryption Feature?

      • Encrypted: indicates that the EVS disk has been encrypted.
      • Create Xrole: grants KMS access rights to EVS to obtain KMS keys. After the rights are granted, follow-up operations do not require granting rights again.
      • KMS Key Name: specifies the name of the key used by the encrypted EVS disk. By default, the name is evs/default.
      • Xrole Name: EVSAccessKMS: specifies that rights have been granted to EVS to obtain KMS keys for encrypting or decrypting EVS disks.
      • KMS Key ID: specifies the ID of the key used by the encrypted data disk.

    For details about the disk types supported by the ECS, see section Block Storage. For more information about EVS disks, see Elastic Volume Service User Guide.

    NOTE:

    If you detach the system disk purchased when you buy a yearly/monthly ECS and want to continue using it as a system disk, you can only attach it to the original ECS. If you want to use it as a data disk, you can attach it to any ECS.

    If you detach the non-shared data disk purchased when you buy a yearly/monthly ECS and want to attach it again, you can only attach it to the original ECS as a data disk.

    The data disk purchased when you buy a yearly/monthly ECS does not support separate renewal, unsubscription, automatic service renewal, conversion to pay-per-use payment, and release.

  11. Configure automatic backup.

    After automatic backup is enabled, the system automatically backs up the ECS based on the preset backup policy.

    1. Select Enable.
    2. Configure Backup Policy.

      In the drop-down list, select a backup policy. Alternatively, you can click Manage Backup Policy and set the backup policy on the Cloud Server Backup Service (CSBS) page. If you have not created any backup policy but have selected Enable, the system will use the default backup policy, as shown in Figure 1.

      Figure 1 Default backup policy

    For more information about ECS backup, see Cloud Server Backup Service User Guide.

  12. Set network parameters, including VPC, Security Group, NIC, and EIP.

    When you use VPC for the first time, the system automatically creates a VPC for you, including the security group and NIC.

    Table 1 Parameter descriptions

    Parameter

    Description

    VPC

    Provides a network, including subnet and security group, for an ECS.

    You can select an existing VPC, or click View VPC and create a desired one.

    For more information about VPC, see Virtual Private Cloud User Guide.

    NOTE:

    Ensure that DHCP is enabled in the VPC to which the ECS belongs.

    Security Group

    Controls ECS access within or between security groups by defining access rules. This enhances ECS security.

    When creating an ECS, you can select multiple (recommended not more than five) security groups. In such a case, the access rules of all the selected security groups apply on the ECS.

    Security group rules determine ECS access and usage. For instructions about how to configure a security group rule, see section Adding a Security Group Rule. The following section describes common protocols and ports. Enable them as needed.

    • Port 80: used to view web pages by default through HTTP.
    • Port 443: used to view web pages through HTTPS.
    • ICMP: pings ECSs to check their communication statuses.
    • Port 22: reserved for logging in to a Linux ECS using SSH.
    • Port 3389: reserved for logging in to a Windows ECS using SSH.
    NOTE:

    Before initializing an ECS, ensure that the security group rule in the outbound direction meets the following requirements:

    • Protocol: TCP
    • Port Range: 80
    • Remote End: 169.254.0.0/16

    If you use the default security group rule in the outbound direction, the preceding requirements are met, and the ECS can be initialized. The default security group rule in the outbound direction is as follows:

    • Protocol: ANY
    • Port Range: ANY
    • Remote End: 0.0.0.0/16

    NIC

    Includes primary and extension NICs. You can add multiple expansion NICs to an ECS and specify IP addresses for them (including primary NICs).

    NOTE:

    When you specify an IP address for an ECS, if multiple ECSs are created in a batch:

    • This IP address serves as the start IP address.
    • Ensure that the IP addresses required by the ECSs are within the subnet, consecutive, and available.
    • This subnet cannot duplicate a subnet with a specified start IP address.
    • MTU Settings: optional

      If your ECS is of M2, large-memory, H1, or D1 type, you can click MTU Settings to configure the maximum transmission unit (MTU) for a to-be-added extension NIC for improving network performance. An MTU can only be a number, ranging from 1280 to 8888.

    • Self-assigned IPv6 address: This parameter is available only if an SN3 ECS is selected and IPv6 is enabled in the VPC subnet. For instructions about how to enable IPv6 on a subnet, see section IPv4 and IPv6 Dual-Stack Network.

      By default, the system assigns IPv4 addresses. After Self-assigned IPv6 address is selected, the system assigns IPv6 addresses. In a VPC, an ECS uses an IPv6 address to access the dual-stack Intranet. To access the Internet, you must enable IPv6 Bandwidth and select a shared bandwidth. Then, the ECS can access the IPv6 Internet through the IPv6 address.

      After purchasing an ECS, enable IPv6 so that the ECS dynamically obtains an IPv6 address. For details, see section Dynamically Assigning IPv6 Addresses.
      NOTE:
      • IPv4 and IPv6 dual-stack is at open beta test only in the CN North-Beijing4 region and will be offered in other regions later.
      • IPv6 can be enabled only during ECS creation, and the configuration cannot be modified. If IPv6 Bandwidth is not enabled when you create an ECS, you can enable it after the ECS is created.
      • Only SN3 ECSs can use IPv6 addresses.
      • Exclusive bandwidth is not supported.

    EIP

    A static public IP address bound to an ECS in a VPC. Using the EIP, the ECS provides services externally.

    The following options are provided:

    • Not required

      Without an EIP, the ECS cannot access the Internet and is used only in the private network or cluster.

    • Automatically assign

      The system automatically assigns an EIP for the ECS. The EIP provides exclusive bandwidth that is configurable.

    • Use existing

      An existing EIP is assigned for the ECS. When using an existing EIP, you cannot create ECSs in batches.

    NOTE:

    If the ECS to be created will be used as an email server, you are advised to configure reverse domain name resolution for the EIP. This will significantly reduce the number of junk emails. For more information, see section Configuring a PTR Record.

    Specifications

    • When changes occur on a network using static BGP, network configurations cannot be promptly adjusted to ensure optimal user experience.
    • When changes occur on a network using dynamic BGP, network configurations can be promptly adjusted using the specified routing protocol, ensuring network stability and optimal user experience.

    Bandwidth Type

    This parameter is mandatory if EIP is set to Automatically assign.

    • Exclusive: The bandwidth can be used by only one EIP.
    • Shared: The bandwidth can be used by multiple EIPs.
      NOTE:
      • A bandwidth can be shared between limited number of EIPs. If the number of EIPs cannot meet service requirement, switch to a higher shared bandwidth or apply to expand the EIP quota of the existing bandwidth.
      • EIPs that are charged yearly/monthly do not support shared bandwidths.
      • When a shared bandwidth that is charged yearly/monthly expires, the system automatically deletes the bandwidth and creates an exclusive bandwidth charged by traffic for the EIPs sharing the deleted bandwidth.

    Billing Mode

    This parameter is mandatory if EIP is set to Automatically assign.

    It indicates the bandwidth billing mode of the purchased EIP, which includes the following options:

    • Bandwidth: You are charged by the purchased bandwidth.
    • Traffic: You are charged based on the actual traffic you have used.
  13. Set Login Mode.
    Key pair authentication is more secure than password authentication. You are advised to set Login Mode to Key pair. If you select Password, ensure that the password meets complexity requirements listed in Table 2 to prevent malicious attacks.
    • Key pair

      A key pair is used for ECS login authentication. You can select an existing key pair, or click View Key Pair and create a desired one.

      NOTE:

      If you use an existing key pair, make sure that you have saved the key file locally. Otherwise, logging in to the ECS will fail.

    • Password

      A username and its initial password are used for ECS login authentication.

      The initial password of user root is used for authentication in Linux, while that of user Administrator is used for authentication in Windows. The passwords must meet the requirements described in Table 2.

      Table 2 Password complexity requirements

      Parameter

      Requirement

      Example Value

      Password

      • Consists of 8 characters to 26 characters.
      • Contains at least three of the following character types:
        • Uppercase letters
        • Lowercase letters
        • Numerals
        • Special characters:

          $!@%-_=+[

          ]:./^,{}?

      • Cannot contain the username or the username in reverse.
      • Cannot contain more than two characters in the same sequence as they appear in the username. (This requirement applies only to Windows ECSs.)

      Test12!@

      NOTE:

      The system does not periodically change the ECS password. It is recommended that you change your password regularly for security.

  14. Configure Advanced Settings.
    To use functions listed in Advanced Settings, click Configure now. Otherwise, click Do not configure.
    • File Injection

      Enables the ECS to automatically inject a script file or other files into a specified directory on an ECS when you create the ECS. This configuration is optional.

      For example, if you activate user root permission using script file injection, you can log in to the ECS as user root.

      For details about file injection, see section (Optional) Injecting Files into ECSs.

    • User Data Injection

      Enables the ECS to automatically inject user data when the ECS starts for the first time. This configuration is optional.

      For example, if you activate user root permission using script data injection, you can log in to the ECS as user root.

      For detailed operations, see section Injecting User Data into ECSs.

    • ECS Group

      An ECS group applies the anti-affinity policy to the ECSs in it so that the ECSs can be distributed on different hosts. This configuration is optional. For instructions about how to create an ECS group, see section Managing ECS Groups.

    • Enterprise Project

      This parameter is provided for enterprise users. To enable this function, contact the customer service.

      An enterprise project is a cloud resource management mode, in which cloud resources and members are centrally managed by project. The default project is default.

      Select an enterprise project from the drop-down list. For more information about enterprise project, see Enterprise Management User Guide.

    • Tag

      Tags an ECS, facilitating ECS identification and management. This configuration is optional. You can add up to 10 tags to an ECS.

      For detailed operations, see section Tags.

    • Agency Name

      This configuration is optional. An agency is created by the tenant administrator in IAM and provides a temporary credential for an ECS to access cloud services. If you have created an agency in IAM, you can select the agency name from the drop-down list and obtain specified operation permissions.

  15. Set ECS Name.

    The name can be customized but must comply with the following naming rules: Can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

    If you want to purchase multiple ECSs at a time, the system automatically sequences these ECSs.

    If multiple ECSs are purchased at the same time, the system automatically adds a hyphen followed by a four-digit incremental number to the end of each ECS name. For example, if you enter ecs, the ECSs will be named ecs-0001, ecs-0002, .... If you purchase multiple ECSs again, the values in the new ECS names increase from the existing maximum value. For example, the existing ECS with the maximum number in name is ecs-0010. If you enter ecs, the names of the new ECSs will be ecs-0011, ecs-0012, .... When the value reaches 9999, it will start from 0001.

    Allow duplicate ECS names: allows ECS names to be duplicate. If you select Allow duplicate ECS names and create multiple ECSs in a batch, the created ECSs will have the same name.

  16. Configure the number of ECSs to be purchased.
    • Usage Duration: sets the service duration if you select the Yearly/Monthly billing mode. The usage duration ranges from one month to three years.
    • Quantity: sets the number of ECSs to be purchased.

      The maximum number of ECSs you are allowed to purchase is displayed. To ensure effective resource usage, an upper limit is set on the ECSs to be purchased. If the number of ECSs you need exceeds the maximum number of ECSs you are allowed to purchase, click Increase Quota to obtain a higher quota. You can purchase the ECSs you need after the request is approved.

    • ECS Price: shows the ECS configuration fee.

      For details, click Price details.

  17. In the configuration area on the right side of the page, click Next.

    To learn more about the price, click Price Details.

    NOTE:

    If you want to purchase ECSs of other specifications in the current billing mode, you can click Add to List to add them to the shopping list.

  18. On the page for you to confirm ECS specifications, you can view details about the application and submit the application.
    • In Yearly/Monthly billing mode, after confirming the specifications and price of the order, agree to the service agreement, click Submit, and complete the payment as prompted.
    • In Pay-per-use billing mode, after confirming the specifications and price of the order, agree to the service agreement and click Submit.
    • In Spot price billing mode, after confirming the specifications and price of the order, agree to the service agreement and click Submit.
NOTE:

Creating an ECS takes several minutes. You can check the creation progress by viewing the ECS creation status. For details, see section Viewing ECS Creation Statuses.

Step 2: Log In to the ECS

You can log in to a Windows ECS using either VNC or MSTSC provided on the management console.

Figure 2 Windows ECS login modes
  1. Log in to the management console.
  2. Under Computing, click Elastic Cloud Server.
  3. Select the target ECS for login.
  4. (Optional) Obtain the password.

    To log in to a key-authenticated ECS, use the password obtaining function provided by the management console to decrypt the key file for obtaining a password.

    For details, see section Obtaining the Password for Logging In to a Windows ECS.

  5. Select a login mode as required to log in to the ECS.

Follow-up Procedure

  • After an ECS with automatic recovery enabled is created, you can check whether this function has been enabled by viewing Failed Tasks. For details, see section ECS Instances > Status Management > Viewing Failed Tasks in Elastic Cloud Server User Guide.
  • If you have added a data disk during ECS creation, you must initialize the data disk after logging in to the ECS.

    For details, see section Scenarios and Disk Partitions.

  • Certain ECSs require the installation of a driver after you log in to them. For details about available ECS types as well as their functions and usage, see "Notes" in section ECS Types.