ECS Advantages
ECS supports automated scaling of compute resources based on traffic changes and predefined scaling policies. You can customize ECS specifications including vCPUs, memory, and bandwidth to let your applications run in a flexible, efficient environment.
Reliability
- A broad range of EVS disk types
You can choose from the following disk types to meet your specific demand:
- High I/O EVS disks: They provide high performance, scalability, and reliability. If your applications require high performance, high read/write speed, and instant data storage, you can store data on high I/O EVS disks.
- General purpose SSDs: Such disks are cost-effective. You can use them for high-throughput, low-latency applications.
- Ultra-high I/O EVS disks: They provide high performance and low latency. They are ideal for read/write-intensive applications requiring extremely high performance and low latency.
- Extreme SSDs: They use RDMA that controls congestion at low latency. They are ideal for applications that require ultra-large bandwidth and ultra-low latency.
- General-purpose SSD V2 disks: They allow for tailored IOPS and throughput and are suitable for transactional workloads that demand high performance and low latency.
For more information about EVS disk specifications and performance, see Elastic Volume Service User Guide.
- Distributed architecture
ECS provides scalable, reliable, and high-throughput virtual block storage on a distributed architecture. This ensures that data can be rapidly migrated and restored if any data replica is unavailable, preventing data loss caused by a single hardware fault.
Security
- Multi-dimensional protection
A number of security services, such as Web Application Firewall (WAF) and Vulnerability Scan Service (VSS) are available.
- Security evaluation
Cloud security evaluation and security configuration check help you identify security vulnerabilities and threats, reducing or eliminating your loss from viruses or attacks.
- Intelligent process management
You can customize an allowlist to automatically prohibit the execution of unauthorized programs.
- Vulnerability scan
Comprehensive scan services are available, including general web vulnerability scan, third-party application vulnerability scan, port detection, and fingerprint identification.
Hardware and Software
Scalability
- Automated scaling of computing resources
Dynamic scaling: AS automatically increases or decreases the number of ECSs in an AS group based on monitored data.
Periodic/Scheduled scaling: AS increases or decreases the number of ECSs in an AS group at a regular interval or a specified time based on the predicted load or a pre-set plan.
- Flexible adjustment of ECS specifications
ECS specifications and bandwidth can be flexibly adjusted based on service requirements.
- Flexible billing options
You have the flexibility to choose different billing options like yearly/monthly and pay-per-use based on your service characteristics.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot