What's New
The tables below describe the functions released in each Virtual Private Cloud version and corresponding documentation updates. New features will be successively launched in each region.
December 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Traffic Mirroring example scenarios |
Example scenarios:
|
Commercial use |
Mirroring Inbound and Outbound TCP Traffic to a Network Interface in a Different VPC Mirroring Inbound and Outbound TCP Traffic to a Load Balancer |
November 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Guidance for configuring policy-based routes for ECSs with multiple network interfaces |
Added operation procedure for configuring IPv4 and IPv6 policy-based routes for a Linux ECS with multiple network interfaces running Ubuntu. |
Commercial use |
|
2 |
Optimized the network ACL instructions |
Changed parameter Priority of a network ACL rule to Rule Number and provided detailed explanation. |
Commercial use |
October 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Traffic Mirroring example scenarios |
Example scenarios:
|
Commercial use |
Mirroring Inbound TCP Traffic to a Single Network Interface Mirroring Inbound TCP and UDP Traffic to Multiple Network Interfaces |
September 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Optimized console for managing resource tags |
You can manage tags of a resource more flexibly. |
Commercial use |
|
2 |
Optimized console for creating VPCs and subnets |
You can create VPCs and subnets on the console in an easier and more interactive way. |
Commercial use |
|
3 |
Optimized navigation bar of the network console |
Service features are reorganized and rearranged in the navigation bar of the network console. The main changes of VPC include: IP Address Groups is put under Access Control, and Flow Logs and Traffic Mirroring are put under Network Monitoring. |
Commercial use |
August 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Optimized documentation related to virtual IP addresses |
|
Commercial use |
Using a Virtual IP Address and Keepalived to Set Up a High-Availability Web Cluster |
2 |
VPC network connection solutions |
This section describes how you can set up private networks, public networks, and hybrid cloud networks based on the network architecture. |
Commercial use |
|
3 |
VPC and subnet planning |
This section provides network architecture figures to show you how to plan your VPCs and subnets in different networks. |
Commercial use |
July 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Rules adjustable |
When you create a security group, you can modify the rules on the creation page. |
Commercial use |
|
2 |
Optimized quick start |
The configuration guide for the following two scenarios is provided:
|
Commercial use |
June 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
A more user-friendly page for creating a VPC peering connection |
Some configuration examples for configuring VPC peering connections are provided for you to follow. |
Commercial use |
Creating a VPC Peering Connection with Another VPC in Your Account Creating a VPC Peering Connection with a VPC in Another Account |
2 |
Optimized user guide |
Added the following content:
|
Commercial use |
VPC and Subnet Planning Suggestions |
April 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
More user-friendly security group documentation |
|
Commercial use |
Security Groups and Security Group Rules Security Group Configuration Examples Using IP Address Groups to Reduce the Number of Security Group Rules |
2 |
Network ACL tags |
You can use tags to identity and search for network ACLs. |
Commercial use |
|
3 |
Security group tags |
You can use tags to identity and search for security groups. |
Commercial use |
|
4 |
Easier VPC and subnet deletion |
When you delete a VPC or subnet that is used by other resources, you can view the associated resource list on the console and delete them more easily. |
Commercial use |
|
5 |
New console style |
The style of the VPC console is upgraded. |
Commercial use |
March 2024
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
VPC sharing |
With Resource Access Manager (RAM), you can share subnets in a VPC with one or more accounts so you can centrally manage resources in multiple accounts, which improves resource management efficiency and reduces O&M costs. |
Commercial use |
December 2023
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
More operations on an IP address group |
The following operations are allowed:
|
Commercial use |
Adding IP Addresses to an IP Address Group |
2 |
Associating a subnet with a network ACL on the Subnets page |
The following operations on the Subnets page are allowed:
|
Commercial use |
October 2023
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Optimized the function of adding routes for a VPC peering connection. |
If you want to add routes for a VPC peering connection, you do not need to switch to the VPC route table. You can directly add, view, or delete routes on the VPC peering connection details page. |
Commercial use |
Creating a VPC Peering Connection with Another VPC in Your Account Creating a VPC Peering Connection with a VPC in Another Account |
2 |
Added the Allow Common Ports function. |
When adding a security group rule, you can use Allow Common Ports to allow common ports with a few clicks. This function is suitable for the following scenarios:
|
Commercial use |
|
3 |
Optimized resource deletion function. |
|
Commercial use |
August 2023
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Elastic network interfaces and supplementary network interfaces |
|
Commercial use |
July 2023
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Multiple IP addresses can be specified when you add a security group rule. |
If you select IP address for Source or Destination when you add a security group rule, you can enter multiple IP addresses in the same IP address box. Each IP address represents a different security group rule. |
Commercial use |
|
2 |
The Fast-add rule template is available. |
If you select the Fast-add rule template when you create a security group, you can select common protocols and ports on the page to quickly add security group rules. |
Commercial use |
June 2023
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Network ACLs support enterprise projects. |
When creating a network ACL, you can add the network ACL to an enabled enterprise project. |
Commercial use |
|
2 |
Optimized IP address group functions |
An IP address group is a collection of IP addresses. It can be associated with security groups and network ACLs to simplify IP address configuration and management in networking. The following are optimized:
|
Commercial use |
|
3 |
Optimized information on the VPC peering connection console |
A VPC peering connection is a network connection between two VPCs in one region. The following are optimized:
|
Commercial use |
Creating a VPC Peering Connection with Another VPC in Your Account Creating a VPC Peering Connection with a VPC in Another Account |
December 2022
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
New VPC console |
A new VPC console is available and you can click Virtual Private Cloud in the navigation pane on the left and visit My VPCs, Subnets, Route Tables, Network Interfaces, and VPC Peering Connections. |
Commercial use |
October 2021
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Fine-grained VPC permission management |
If you need to assign different permissions to employees in your enterprise to access your VPC resources, IAM is a good choice for fine-grained permissions management. |
Commercial use |
March 2021
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Secondary CIDR block |
You can add a secondary IPv4 CIDR block to your VPC. |
Commercial use |
July 2020
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
IP address group |
An IP address group is a collection of IP addresses that use the same security group rules. You can use an IP address group to manage IP addresses that have the same security requirements or whose security requirements change frequently. An IP address group frees you from repeatedly modifying security group rules and simplifies security group rule management. |
Commercial use |
June 2020
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
IPv4 and IPv6 dual stack |
IPv4 and IPv6 dual stack allows your resources, such as ECSs, to use both the IPv4 and IPv6 addresses for private and public network communication. |
Open beta testing |
December 2019
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Custom route tables are now available and can be associated with subnets. |
After a subnet is created for the VPC, the subnet is automatically associated with the default route table created for the VPC because each subnet must be associated with a route table. If you do not want to use the default route table, you can now create a custom route table and associate it with the subnet. A route table can be associated with multiple subnets. However, each subnet can only be associated with one route table. |
Commercial use |
October 2019
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
VPC flow log |
A VPC flow log records information about traffic going to and from your VPC. VPC flow logs help you monitor network traffic, analyze network attacks, and determine whether security group and network ACL rules require modification. Apply for Open Beta Test VPC flow logs must be used together with the Log Tank Service (LTS). You need to create a log group and a log topic in LTS, and then create a VPC flow log. |
Open beta testing |
|
2 |
Security group cloning |
You can clone a security group from one region to another and quickly apply the security group rules to ECSs in another region. |
Commercial use |
September 2019
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
A security group can be created using a specific template. |
You can quickly create a security group using a specific template that contains security group rules. |
Commercial use |
July 2018
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Batch import and export of security group rules |
You can import and export security group rules in batches. |
Commercial use |
|
2 |
Security group rule replication |
You can easily replicate an existing security group rule from one security group to another. |
Commercial use |
July 2017
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
Custom routes |
A custom route is a user-defined routing rule added to a VPC. The route enables ECSs in a VPC that do not have EIPs bound to access the Internet. |
Commercial use |
|
2 |
Network ACL |
A network access control list (ACL) acts as a firewall for controlling network traffic in and out of a subnet, adding an additional layer of security to your subnets. You can create network ACLs, add inbound and outbound rules, and associate subnets to protect resources in your subnets. |
Commercial use |
|
3 |
VPC peering connections |
A VPC peering connection allows two VPCs communicate with each other using private IP addresses as if they were in the same VPC. You can create a VPC peering connection between your own VPCs, or between your VPC and a VPC of another account within the same region. A VPC peering connection between VPCs in different regions will not take effect. |
Commercial use |
March 2016
No. |
Feature |
Description |
Phase |
Document |
---|---|---|---|---|
1 |
VPC |
A Virtual Private Cloud (VPC) is a private and isolated virtual network created on HUAWEI CLOUD. The VPC gives you complete control over your virtual network, allowing you to select your own IP address range, create subnets, configure security groups, and even assign EIPs and allocate bandwidth in your network, enabling secure and easy access to your business system. Application Scenarios:
|
Commercial use |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot