Updated on 2024-07-31 GMT+08:00

ECS Advantages

ECS supports automated scaling of compute resources based on traffic changes and predefined scaling policies. You can customize ECS specifications including vCPUs, memory, and bandwidth to let your applications run in a flexible, efficient environment.

Reliability

  • A broad range of EVS disk types
    You can choose from the following disk types to meet your specific demand:
    • High I/O EVS disks: They provide high performance, scalability, and reliability. If your applications require high performance, high read/write speed, and instant data storage, you can store data on high I/O EVS disks.
    • General purpose SSDs: Such disks are cost-effective. You can use them for high-throughput, low-latency applications.
    • Ultra-high I/O EVS disks: They provide high performance and low latency. They are ideal for read/write-intensive applications requiring extremely high performance and low latency.
    • Extreme SSDs: They use RDMA that controls congestion at low latency. They are ideal for applications that require ultra-large bandwidth and ultra-low latency.
    • General-purpose SSD V2 disks: They allow for tailored IOPS and throughput and are suitable for transactional workloads that demand high performance and low latency.

    For more information about EVS disk specifications and performance, see Elastic Volume Service User Guide.

  • Distributed architecture

    ECS provides scalable, reliable, and high-throughput virtual block storage on a distributed architecture. This ensures that data can be rapidly migrated and restored if any data replica is unavailable, preventing data loss caused by a single hardware fault.

  • Backup and restoration

    You can set automatic backup policies to back up in-service ECSs and EVS disks. You can also configure policies on the management console or use an API to back up the data of ECSs and EVS disks at a specified time.

Security

  • Multi-dimensional protection

    A number of security services, such as Web Application Firewall (WAF) and Vulnerability Scan Service (VSS) are available.

  • Security evaluation

    Cloud security evaluation and security configuration check help you identify security vulnerabilities and threats, reducing or eliminating your loss from viruses or attacks.

  • Intelligent process management

    You can customize an allowlist to automatically prohibit the execution of unauthorized programs.

  • Vulnerability scan

    Comprehensive scan services are available, including general web vulnerability scan, third-party application vulnerability scan, port detection, and fingerprint identification.

Hardware and Software

  • Professional hardware devices

    You can deploy ECSs on professional hardware devices that allow in-depth virtualization optimization, delivering superior virtual server performance.

  • Virtual resources accessible anytime, anywhere

    You can obtain scalable, dedicated resources from the virtual resource pool anytime, anywhere, so your applications can run in reliable, secure, flexible, and efficient environments. You can use your ECS like the way you are using your local computer.

Scalability

  • Automated scaling of computing resources

    Dynamic scaling: AS automatically increases or decreases the number of ECSs in an AS group based on monitored data.

    Periodic/Scheduled scaling: AS increases or decreases the number of ECSs in an AS group at a regular interval or a specified time based on the predicted load or a pre-set plan.

  • Flexible adjustment of ECS specifications

    ECS specifications and bandwidth can be flexibly adjusted based on service requirements.

  • Flexible billing options

    You have the flexibility to choose different billing options like yearly/monthly and pay-per-use based on your service characteristics.