Product Advantages
IMS provides convenient, secure, flexible, and efficient image management. Images allow you to deploy services faster, more easily and more securely.
Saving Time and Effort
- Deploying services on cloud servers is much faster and easier when you use images.
- A private image can be created from an ECS, a BMS, or an external image file. It can be a system disk, data disk, or full-ECS image that suites your different needs.
- Private images can be transferred between accounts, regions, or cloud platforms through image sharing, replication, and export.
Secure
- Public images use Huawei EulerOS and mainstream OSs such as Ubuntu, Windows Server, and CentOS. These OSs have been thoroughly tested to provide secure and stable services.
- Multiple copies of image files are stored on Object Storage Service (OBS), which provides excellent data reliability and durability.
- Private images can be encrypted for data security by using envelope encryption provided by Key Management Service (KMS).
Flexible
- You can manage images through the management console or using APIs.
- You can use a public image to deploy a general-purpose environment, or use a private image or KooGallery image to deploy a custom environment.
- You can use IMS to migrate servers to the cloud or on the cloud, and back up server running environments.
Unified
- IMS provides a self-service platform to simplify image management and maintenance.
- IMS allows you to batch deploy and upgrade application systems, improving O&M efficiency and ensuring consistency.
- Public images comply with industry standards. Preinstalled components only include clean installs, and only kernels from well-known third-party vendors are used to make it easier to transfer images from or to other cloud platforms.
Comparison Between Image-based Deployment and Manual Deployment
Item |
Image-based Deployment |
Manual Deployment |
---|---|---|
Time required |
2 to 5 minutes |
1 to 2 days |
Complexity |
Quickly create ECSs by using public images, KooGallery images, or private images. |
Select an appropriate OS, database, and various software packages based on your service requirements. Then, install and commission them. |
Security |
You only need to identify sources of shared images. Public, KooGallery, and private images have been thoroughly tested to ensure security and stability. |
The security depends on the skills of the R&D or O&M personnel. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot