Help Center> > Getting Started> Purchasing and Logging In to a Windows ECS

Purchasing and Logging In to a Windows ECS

Updated at: 2019-03-14 19:57

Scenarios

ECSs are more cost-effective than physical servers. Within minutes, you can obtain ECS resources from the public cloud. ECS resources are flexible and on-demand. This section describes how to purchase an ECS.

Step 1: Purchase an ECS

Step 2: Log In to the ECS

Notes

Dedicated physical resources

To run an ECS on isolated physical hardware, apply for a Dedicated Computing Cluster (DCC) before creating the ECS.

For details about DCC, see Dedicated Computing Cluster User Guide.

Step 1: Purchase an ECS

  1. Log in to the management console.
  2. Under Computing, click Elastic Cloud Server.
  3. Click Buy ECS.

    The ECS purchasing page is displayed.

  4. Select a billing mode, Yearly/Monthly or Pay-per-use.
    • In Yearly/Monthly billing mode, purchase an ECS configuration and set Usage Duration. Then, the system deducts the fees incurred at one time from your account based on the service price.
      NOTE:

      Yearly/Monthly ECSs cannot be deleted. They support only resource unsubscription. If an ECS is no longer used, switch to the Elastic Cloud Server page, click More in the Operation column of this ECS, and select Unsubscribe to unsubscribe it.

    • In Pay-per-use billing mode, after purchasing an ECS configuration, you do not need to set Usage Duration. Then, the system deducts the fees incurred from your account based on the service duration.
  5. Confirm the region.

    If the region is incorrect, click in the upper left corner of the page for correction.

  6. Select an AZ.

    An AZ is a physical region where power and networks are physically isolated. AZs in the same region can communicate with each other over an intranet.

    • To enhance application availability, create ECSs in different AZs.
    • To shorten network latency, create ECSs in the same AZ.
    NOTE:

    Random: If you set AZ to Random, you can view all ECS types and specifications that are available on the cloud platform.

    The released ECS types and specifications vary depending on AZs. For example, S1 ECSs are released only in AZ 1; S2 ECSs are available in AZ 2 and have been sold out in AZ 1. To view all supported ECS types and specifications on the public cloud platform, set AZ to Random. Then, the system automatically allocates an AZ according to your selected ECS flavor.

  7. Set Specifications.

    The public cloud provides various ECS types for different application scenarios. You can view released ECS types and flavors in the list. Alternatively, you can enter a flavor (such as c3) or specify vCPUs and memory size to search for the desired flavor.

    NOTE:
    • Before selecting an ECS type, learn the introduction and notes on each type of ECSs. For details, see section ECS Types.
    • When purchasing an ECS, you are not allowed to select sold-out CPU and memory resources.
  8. Click Image.
    • Public image

      A public image is a standard, widely used image. It contains an OS and preinstalled public applications and is available to all users. You can configure the applications or software in the public image as needed.

    • Private image

      A private image is an image available only to the user who creates it. It contains an OS, preinstalled public applications, and the user's private applications. Using a private image to create ECSs removes the need to configure multiple ECSs repeatedly.

      You can also select an encrypted image. For details, see Image Management Service User Guide.

      If you have used a CSBS backup to create a private image (full-ECS image), you can use the full-ECS image. However, the EVS disk in the image does not support disk creation using a data disk image, and disk attributes (such as SCSI/VBD and data encryption) cannot be modified. For more details about how to use CSBS backups to create images, see section "Using Backups to Create Images" in Cloud Server Backup Service User Guide and section "Creating a Full-ECS Image Using a CSBS Backup" in Image Management Service User Guide.

    • Shared image

      A shared image is a private image shared by another user.

  9. Set Disk.
    Disks are classified as EVS disks and DSS disks based on whether the storage resources used by the disks are exclusive. DSS disks allow you to use exclusive storage resources.
    • If you have applied for a storage pool on the DSS page, click the DSS tab and create disks in the obtained storage pool.
    • If you have not applied for an exclusive storage pool, click the Disks tab and create EVS disks that use public storage resources.
      NOTE:
      • When you use DSS resources to create a disk, the disk type must be the same as that of the requested storage pool. For example, both are of high I/O type.
      • For more information about DSS, see Dedicated Distributed Storage Service User Guide.

    A disk can be a system disk or a data disk.

    When creating an ECS, you can add up to 24 disks with customized sizes to it. After the ECS is created, you can add up to 60 disks to such a newly created ECS.

    • System Disk

      If the image based on which an ECS is created is not encrypted, the system disk of the ECS is not encrypted. In addition, Unencrypted is displayed for the system disk on the page. If the image based on which an ECS is created is encrypted, the system disk of the ECS is automatically encrypted. For details, see section (Optional) Encryption-related parameters.

    • Data Disk

      You can create multiple data disks for an ECS and configure sharing and encryption for each data disk.

      • SCSI: indicates that the device type of the data disk is SCSI. For more information about SCSI disks and the ECSs that can be attached with SCSI disks, see section Block Storage.
      • Share: indicates that the EVS disk is shared. Such an EVS disk can be attached to multiple ECSs.
      • Encryption: indicates that the data disk is encrypted. For details, see section (Optional) Encryption-related parameters.
    • (Optional) Encryption-related parameters

      To enable encryption, click Create Xrole to grant KMS access rights to EVS. If you have rights granting permission, grant the KMS access rights to EVS. If you do not have the permission, contact the user having the security administrator rights to grant the KMS access rights.

      • Encrypted: indicates that the EVS disk has been encrypted.
      • Create Xrole: grants KMS access rights to EVS to obtain KMS keys. After the rights are granted, follow-up operations do not require granting rights again.
      • KMS Key Name: specifies the name of the key used by the encrypted EVS disk. By default, the name is evs/default.
      • Xrole Name: EVSAccessKMS: specifies that rights have been granted to EVS to obtain KMS keys for encrypting or decrypting EVS disks.
      • KMS Key ID: specifies the ID of the key used by the encrypted data disk.

    For details about the disk types supported by the ECS, see section Block Storage. For more information about EVS disks, see Elastic Volume Service User Guide.

    NOTE:

    If you detach the system disk purchased when you buy a yearly/monthly ECS and want to continue using it as a system disk, you can only attach it to the original ECS. If you want to use it as a data disk, you can attach it to any ECS.

    If you detach the non-shared data disk purchased when you buy a yearly/monthly ECS and want to attach it again, you can only attach it to the original ECS as a data disk.

    The data disk purchased when you buy a yearly/monthly ECS does not support separate renewal, unsubscription, automatic service renewal, conversion to pay-per-use payment, and release.

  10. Set network parameters, including VPC, Security Group, NIC, and EIP.

    When you use VPC for the first time, the system automatically creates a VPC for you, including the security group and NIC.

    Table 1 Parameter descriptions

    Parameter

    Description

    VPC

    Provides a network, including subnet and security group, for an ECS.

    You can select an existing VPC, or click View VPC and create a desired one.

    For more information about VPC, see Virtual Private Cloud User Guide.

    NOTE:

    Ensure that DHCP is enabled in the VPC to which the ECS belongs.

    Security Group

    Controls ECS access within or between security groups by defining access rules. This enhances ECS security.

    When creating an ECS, you can select multiple (recommended not more than five) security groups. In such a case, the access rules of all the selected security groups apply on the ECS.

    NOTE:

    Before initializing an ECS, ensure that the security group rule in the outbound direction meets the following requirements:

    • Protocol: TCP
    • Port Range: 80
    • Remote End: 169.254.0.0/16

    If you use the default security group rule in the outbound direction, the preceding requirements are met, and the ECS can be initialized. The default security group rule in the outbound direction is as follows:

    • Protocol: ANY
    • Port Range: ANY
    • Remote End: 0.0.0.0/16

    NIC

    Includes primary and extension NICs. You can add multiple expansion NICs to an ECS and specify IP addresses for them (including primary NICs).

    NOTE:

    When you specify an IP address for a NIC, if multiple ECSs are created in a batch:

    • This IP address serves as the start IP address.
    • Ensure that the IP addresses required by the ECSs are within the subnet, consecutive, and available.
    • This subnet cannot duplicate a subnet with a specified start IP address.
    • MTU Settings: optional

      If your ECS is of M2, large-memory, H1, or D1 type, you can click MTU Settings to configure the maximum transmission unit (MTU) for a to-be-added extension NIC for improving network performance. An MTU can only be a number, ranging from 1280 to 8888.

    EIP

    A static public IP address bound to an ECS in a VPC. Using the EIP, the ECS provides services externally.

    The following options are provided:

    • Not required

      Without an EIP, the ECS cannot access the Internet and is used only in the private network or cluster.

    • Automatically assign

      The system automatically assigns an EIP for the ECS. The EIP provides dedicated bandwidth that is configurable.

    • Use existing

      An existing EIP is assigned for the ECS. When using an existing EIP, you cannot create ECSs in batches.

    NOTE:

    For a yearly/monthly ECS, Automatically assign is unavailable to EIP. If an EIP is required, bind an existing EIP to the ECS. Alternatively, purchase an EIP that is billed in pay-per-use mode and then bind the EIP to the ECS.

    Type

    • When changes occur on a network using static BGP, network configurations cannot be promptly adjusted to ensure optimal user experience.
    • When changes occur on a network using dynamic BGP, network configurations can be promptly adjusted using the specified routing protocol, ensuring network stability and optimal user experience.

    Billing Mode

    This parameter is mandatory if your ECS is billed in pay-per-use mode and EIP is set to Automatically assign.

    Bandwidth: The EIP bandwidth is billed based on the actual traffic you have used.

    Traffic: You are billed based on the actual traffic you have used.

  11. Set Login Mode.
    Key pair authentication is more secure than password authentication. You are advised to set Login Mode to Key pair. If you select Password, ensure that the password meets complexity requirements listed in Table 2 to prevent malicious attacks.
    • Key pair

      A key pair is used for ECS login authentication. You can select an existing key pair, or click Create Key Pair and create a desired one.

      NOTE:

      If you use an existing key pair, make sure that you have saved the key file locally. Otherwise, logging in to the ECS will fail.

    • Password

      A username and its initial password are used for ECS login authentication.

      The initial password of user root is used for authentication in Linux, while that of user Administrator is used for authentication in Windows. The passwords must meet the requirements described in Table 2.

      Table 2 Password complexity requirements

      Parameter

      Requirement

      Example Value

      Password

      • Consists of 8 characters to 26 characters.
      • Contains at least three of the following character types:
        • Uppercase letters
        • Lowercase letters
        • Numerals
        • Special characters:

          $!@%-_=+[

          ]:./^,{}?

      • Cannot contain the username or the username in reverse.
      • Cannot contain more than two characters in the same sequence as they appear in the username. (This requirement applies only to Windows ECSs.)

      Test12!@

      NOTE:

      The system does not periodically change the ECS password. It is recommended that you change your password regularly for security.

  12. Configure Advanced Settings.
    To use functions listed in Advanced Settings, click Configure now. Otherwise, click Do not configure.
    • User Data Injection

      Enables the ECS to automatically inject user data when the ECS starts for the first time. This configuration is optional.

      For example, if you activate user root permission using script file injection, you can log in to the ECS as user root.

      For detailed operations, see section Injecting User Data into ECSs.

    • ECS Group

      An ECS group applies the anti-affinity policy to the ECSs in it so that the ECSs can be distributed on different hosts. This configuration is optional. For instructions about how to create an ECS group, see section Managing ECS Groups.

    • Throughput Optimization

      Enabling throughput optimization increases the data I/O bandwidth between ECSs and EVS disks, improving storage performance.

    • Agency

      This configuration is optional. When your ECS resources need to be shared with other accounts, or your ECS is delegated to professional personnel or team for management, the tenant administrator creates an agency in IAM and grants the ECS management rights to the personnel or team. The delegated account can log in to the cloud system and switch to your account to manage resources. You do not need to share security credentials (such as passwords) with other accounts, ensuring the security of your account.

      If you have created an agency in IAM, you can select the agency from the drop-down list and obtain specified operation permissions. For more information about agency, see section Delegating Other Accounts to Manage Resources.

  13. Set ECS Name.

    The name can be customized but must comply with the following naming rules: Can contain only letters, digits, underscores (_), hyphens (-), and periods (.).

    If you want to purchase multiple ECSs at a time, the system automatically sequences these ECSs.

    If multiple ECSs are purchased at the same time, the system automatically adds a hyphen followed by a four-digit incremental number to the end of each ECS name. For example, if you enter ecs, the ECSs will be named ecs-0001, ecs-0002, .... If you purchase multiple ECSs again, the values in the new ECS names increase from the existing maximum value. For example, the existing ECS with the maximum number in name is ecs-0010. If you enter ecs, the names of the new ECSs will be ecs-0011, ecs-0012, .... When the value reaches 9999, it will start from 0001.

    Allow duplicate ECS names: allows ECS names to be duplicate. If you select Allow duplicate ECS names and create multiple ECSs in a batch, the created ECSs will have the same name.

  14. Configure the number of ECSs to be purchased.
    • Usage Duration: sets the service duration if you select the Yearly/Monthly billing mode. The usage duration ranges from one month to three years.
    • Quantity: sets the number of ECSs to be purchased.

      The maximum number of ECSs you are allowed to purchase is displayed. To ensure effective resource usage, an upper limit is set on the ECSs to be purchased. If the number of ECSs you need exceeds the maximum number of ECSs you are allowed to purchase, click Increase Quota to obtain a higher quota. You can purchase the ECSs you need after the request is approved.

    • ECS Price: shows the ECS configuration fee.

      For details, click Pricing details.

  15. In the configuration area on the right side of the page, click Next.

    To learn more about the price, click Pricing details.

    NOTE:

    If you want to purchase ECSs of other specifications in the current billing mode, you can click Add to List to add them to the shopping list.

  16. On the page for you to confirm ECS specifications, you can view details about the application and submit the application.
    • In Yearly/Monthly billing mode, after confirming the specifications and price of the order, agree to the service agreement, click Submit, and complete the payment as prompted.
    • In Pay-per-use billing mode, after confirming the specifications and price of the order, agree to the service agreement and click Submit.
NOTE:

Creating an ECS takes several minutes. You can check the creation progress by viewing the ECS creation status. For details, see section Viewing ECS Creation Statuses.

Step 2: Log In to the ECS

You can log in to a Windows ECS using either VNC or MSTSC provided on the management console.

Figure 1 Windows ECS login modes
  1. Log in to the management console.
  2. Under Computing, click Elastic Cloud Server.
  3. Select the target ECS for login.
  4. (Optional) Obtain the password.

    To log in to a key-pair-authenticated ECS, use the password obtaining function provided by the management console to decrypt the key file to obtain a password.

    For details, see section Obtaining the Password for Logging In to a Windows ECS.

  5. Select a login mode as required to log in to the ECS.

Follow-up Procedure

  • After an ECS with automatic recovery enabled is created, you can check whether this function has been enabled by viewing Failures. For details, see section ECS Instances > Viewing ECS Information > Viewing Failures in Elastic Cloud Server User Guide.
  • If you have added a data disk during ECS creation, you must initialize the data disk after logging in to the ECS.

    For details, see section Scenarios and Disk Partitions.

  • Certain ECSs require the installation of a driver after you log in to them. For details about available ECS types as well as their functions and usage, see "Notes" in section ECS Types.

Did you find this page helpful?

Submit successfully!

Thank you for your feedback. Your feedback helps make our documentation better.

Failed to submit the feedback. Please try again later.

Which of the following issues have you encountered?







Please complete at least one feedback item.

Content most length 100 character

Content is empty.

OK Cancel