Updated on 2023-09-07 GMT+08:00

Notes and Constraints on Using ECSs

Restricted Usage of ECSs

  • Do not use ECSs as unauthorized private servers.
  • Do not use ECSs for fraudulent transactions, such as click farming on e-commerce websites.
  • Do not use ECSs to initiate network attacks, such as DDoS attacks, CC attacks, web attacks, brute force cracking, or to spread viruses and Trojan horses.
  • Do not use ECSs for traffic transit.
  • Do not use ECSs for web crawling.
  • Do not use ECSs to detect other systems like scanning or penetration unless otherwise being authorized.
  • Do not deploy any illegal websites or applications on ECSs.
  • Do not use ECSs to send spams.

Restricted Operations on ECSs

  • Do not uninstall drivers on the ECS hardware.
  • Do not install external hardware devices, such as encryption dongles or USB flash drives on ECSs.
  • Do not change the MAC address of NICs.
  • Do not install virtualization software on ECSs for nested virtualization.
  • Do not associate software licenses with the physical server hosting an ECS. Once an ECS is migrated from one physical server to another, the associated licenses may become invalid.
  • Do not deploy applications on a single ECS if you require high availability. Set up auto start for your ECSs or deploy applications in cluster or active/standby mode.
  • Data on ECSs running core applications needs to be backed up.
  • Monitoring needs to be configured for ECSs.
  • Do not change the default DNS server address. If you need to configure a public DNS address, configure both a public and a private DNS address on your ECS.

Precautions for Using Windows ECSs

  • Do not stop system processes if you are not sure about the consequences. Otherwise, blue screen of death (BSOD) may occur on the ECS, or the ECS may restart.
  • Ensure that there is at least 2 GB of idle memory. Otherwise, BSOD, frame freezing, or service failure may occur.
  • Do not modify the registry. Otherwise, the system may fail to start. If the modification is mandatory, back up the registry before modifying it.
  • Do not modify ECS clock settings. Otherwise, DHCP lease may fail, leading to the loss of IP addresses.
  • Do not disable virtual memory. Otherwise, system performance may deteriorate, or system exceptions may occur.
  • Do not delete the VMTool program. Otherwise, the ECS may be abnormal.

Precautions for Using Linux ECSs

  • Do not modify the /etc/issue file. Otherwise, the OS distribution will not be identified.
  • Do not delete system directories or files. Otherwise, the system may fail to start or run properly.
  • Do not change the permissions for or names of system directories. Otherwise, the system may fail to start or run properly.
  • Do not upgrade the kernel of the Linux unless necessary.

    When upgrading a Linux kernel, follow the instructions provided in How Can I Upgrade the Kernel of a Linux ECS?

  • Do not change the default /etc/resolv.conf of the DNS server. Otherwise, software sources and NTP may be unavailable.
  • Do not modify default intranet configurations, such as IP addresses, subnet mask, and gateway address of an ECS. Otherwise, network exceptions may occur.
  • Manually specified IP addresses for Linux ECSs are generally static IP addresses. To avoid network exceptions caused by conflicts between NetworkManager and internal network services, do not enable NetworkManager when not required, such as when installing Kubernetes.