Constraints
This section describes notes and constraints on using ECSs.
Precautions
- Do not use ECSs as unauthorized servers for any illegal or violation activities, such as gambling or cross-border VPN.
- Do not use ECSs for fraudulent transactions, such as click farming on e-commerce websites.
- Do not use ECSs to initiate network attacks, such as DDoS attacks, CC attacks, web attacks, brute force cracking, or to spread viruses and Trojan horses.
- Do not use ECSs for traffic transit.
- Do not use ECSs for web crawling.
- Do not use ECSs to detect other systems like scanning or penetration unless otherwise being authorized.
- Do not deploy any illegal websites or applications on ECSs.
- Do not use ECSs to send spams or engage in activities that violate personal privacy.
ECS Purchase Limits
Item |
Description |
---|---|
User account |
You can purchase ECSs only after your account completes real-name authentication. For details, see Real-Name Authentication. |
Regions and AZs |
|
ECS specifications |
There are quota limits for the number of ECSs, the number of vCPUs, and the memory (RAM) capacity, in MiB. You can view the total quotas and the used quotas by referring to Service Quota. If the quotas do not meet your requirements, apply for a higher quota. |
Image |
Windows images are categorized as KooGallery images.
Windows images comply with constraints from third parties, and they are billed based on the pricing details provided by third-party image providers. For more constraints on using images, see Notes and Constraints. |
Disk |
For more constraints on using disks, see Notes and Constraints. |
Network |
The number of extended network interfaces that can be attached to an ECS is determined by the ECS specifications. For details, see A Summary List of x86 ECS Specifications and A Summary List of Kunpeng ECS Specifications. For more constraints on using networks, see Notes and Constraints. |
Security group |
|
Internet |
For more constraints on using EIPs, see Notes and Constraints. |
ECS name |
|
Login mode |
When you select Key pair as the login mode and use an existing key pair, make sure that you have obtained the key file locally, or the login will fail. |
Tag |
A maximum of 10 tags can be added to an ECS. |
Restrictions on Using ECSs
Item |
Description |
---|---|
Windows ECS |
|
Linux ECS |
|
Image boot mode |
The system disk can boot from Basic Input Output System (BIOS) or Unified Extensible Firmware Interface (UEFI) according to the boot mode in the image file.
|
External hardware device |
Do not install external hardware devices, such as encryption dongles, USB flash drives, external hard disks, or bank USB security keys on ECSs. |
Network |
|
Application program software |
|
Migration |
|
Data backup |
Data on ECSs running core applications needs to be backed up. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot