Elastic Cloud Server (ECS)

Elastic Cloud Server (ECS) provides scalable cloud servers, allowing you to build a reliable, secure, and efficient application environment.

  • General-Purpose

  • Memory-intensive

  • Computing-intensive




Security group rules protect the network from viruses and Trojans. The Anti-DDoS, WAF, and WebScan services are included free of charge to further enhance ECS security.

Advantage Integration

Huawei leverages years of hardware development and customization experience to ensure optimal user experience based on Huawei-developed virtualization.

Auto Scaling

ECS specifications and bandwidths can be adjusted to meet service and cost requirements at any time. Excellent computing performance is ensured through ECS+BMS networking.


  • Computing Capability

    A variety of types, specifications, and NICs (1 primary NIC and up to 11 extended NICs) are available.

  • Security Protection

    Comprehensive security protection services ensure ECS security.

  • Storage Capability

    Scalable virtual block storage based on a distributed architecture ensures high reliability and I/O throughput.

Computing Capability
  • Provides various ECS types to meet different scenario requirements.
  • Each ECS type provides multiple specifications that can be modified.
  • Supports multiple NICs. Each ECS supports 1 primary NIC and up to 11 extended NICs.
  • To provide users with optimal services, HUAWEI CLOUD offers the latest, top-performing ECS instances and specifications tailored based on industry and market developments to meet varying user demands. Additionally, HUAWEI CLOUD provides cost-effective service packages and solutions to suit customer requirements.
Security Protection
  • Uses dedicated anti-DDoS devices to provide refined anti-DDoS capabilities for customer Internet applications, defending against all DDoS attacks, such as CC, SYN flood, and UDP flood. Users can configure parameters to specify the threshold for DDoS prevention based on their rented bandwidth and service model. When the system detects a DDoS attack, it notifies the user of defending against the attack.
  • Evaluates user cloud environment security, helping users quickly identify security vulnerabilities and threats. Provides security configuration check as well as the optimal security practice suggestions, maximally reducing or eliminating user loss caused by network viruses and attacks.
  • Provides easy-to-use and secure cloud-based encryption and key management on a simplified key management user interface and allows you to encrypt data of other cloud services, relieving users of non-service concerns.
  • Working with the globally renowned digital certificate service institute, Huawei provides one-stop lifecycle management of Secure Sockets Layer (SSL) certificates and Transport Layer Security (TLS) certificates to offer reliable identity authentication and secure data transmission for websites.
  • Deploys security detection clients on ECSs and works with the anti-intrusion control center of the cloud platform to provide real-time and visualized intrusion trace detection. Additionally, security scanning identifies system vulnerabilities and web page backdoors in ECSs, effectively protecting ECS security and minimizing intrusion risks.
  • Provides security detection for ECSs. The agents installed on ECSs periodically scan the OSs, helping users become promptly aware of the OS security vulnerabilities so that the users can take measures to fix these vulnerabilities before they are used to attack the system.
  • Provides various scanning services, including general web vulnerability scanning, third-party application vulnerability scanning, port detection, and fingerprint identification.
  • Uses agent-based WAF to protect web applications on ECSs against common web attacks, including SQL injection, cross-site scripting (XSS) attacks, web shell uploading, chain theft, and IP whitelist/blacklist.
  • Uses DNS-based WAF to filter out hacker attacks, in addition to hiding and protecting ECS EIPs.
  • Uses the intelligent process management service to automatically prohibit the execution of unauthorized programs based on a customized whitelist, thereby ensuring ECS security.
  • Uses big data mining and machine learning to comprehensively analyze user security status, helping users accurately assess ECS security.
  • Uses file drives to comprehensively protect a specified user directory against hackers or viruses from tampering or destroying files, such as web pages, digital documents, photos, and databases, in the directory.
Storage Capability

EVS disks feature high data reliability and I/O throughput. Users can perform a series of operations on the EVS disk attached to an ECS, such as formatting the disk, creating a file system, or persistently storing data.

  • High reliability: The 3-data-copy mechanism provides 99.99995% data persistency, ensuring data security and reliability.
  • High performance: Each EVS disk supports up to 20,000 IOPS and 350 MB/s throughput. Users can select EVS disks providing different performance based on service requirements.
  • Large capacity: EVS provides block storage with ultra-large capacity. Each ECS can have up to 24 EVS disks attached, and each EVS disk provides up to 32 TB of storage. EVS supports elastic scaling and is paid per use, making it highly cost-effective.
  • Multiple specifications: Common I/O, high I/O, and ultra-high I/O EVS disks are available to users to meet their different service scenario requirements. New specifications will be available later, and users can use them directly.
    Disk Type Maximum Capacity of One Disk Maximum IOPS Per Disk Maximum Throughput Per Disk Latency
    Common I/O 32 T 1,000 90 MB/s 10 ms
    High I/O 32 T 3,000 150 MB/s 3 ms
    Ultra-high I/O 32 T 20,000 350 MB/s 2 ms
  • Usability: EVS is easy to learn and use.

EVS provides various data services for users:

  • Allows users to create data backups for EVS disks and use the backups to restore the EVS disks, maximizing data security and correctness and ensuring service security.
  • Provides users with massive, secure, highly reliable, and low-cost data storage capabilities to store non-structured data, such as documents, photos, audio, and videos.
  • Provides a solution for massive data transmission, which uses physical storage media, such as external Universal Serial Buses (USBs) or external Serial Advanced Technology Attachment (eSATA) hard disks to transmit massive data to HUAWEI CLOUD. This resolves massive data transmission issues, such as high network costs and long transmission time.
  • Provides hosted shared file storage that complies with the standard file protocol (NFS) and that can scale up to the PB level to support massive data and high-bandwidth applications.
  • Management Platform

    A management console, remote access, APIs, and other management modes are available.

  • Network Access

    Dedicated network transmission channels provide security, speed, and stability.

  • Flexible Image Selection

    ECSs can be created with both public and custom images.

Management Platform

Allows users to use multiple management modes, such as the management console, remote access, and APIs, with full rights.

  • Users can manage ECSs like traditional servers, such as remotely logging in to the ECSs and performing all operations.
  • Using the management console, APIs, or commands, users can restart ECSs, reset login passwords, and isolate the ECS network.
  • Users can use the web-based console or open APIs to manage one or thousands of ECSs.

Huawei will consistently optimize the management platform based on user feedback to provide more functions and better user experience and respond more rapidly and efficiently.

  • If the ECS OS malfunctions due to misoperations, attacks, or data tampering, users can reinstall it.
  • ECSs can automatically scale in or out based on service requirements. Users can customize AS configurations and policies to both meet service requirements and reduce resource consumption.
Network Access

HUAWEI CLOUD provides secure, stable, fast, and dedicated network transmission channels for users.

  • Allows users to easily build isolated virtual network environments with full control rights, including applying for EIPs or bandwidths, creating subnets, in addition to configuring DHCP and security groups. Moreover, users can use Direct Connect or virtual private networks (VPNs) to interconnect VPCs with traditional data centers to flexibly integrate resources.
  • Provides secure, stable, fast, and dedicated network transmission channels to interconnect enterprise computing environments with the HUAWEI CLOUD computing environment. Users can use Direct Connect to connect computers in local data centers to ECSs or hosted servers on HUAWEI CLOUD through private networks. This fully leverages the advantages of cloud computing and existing facilities for a flexible, scalable, and hybrid IT computing environment.
  • Provides an encrypted communication tunnel compliant with industry standards between users and VPCs, helping users seamlessly extend services from existing data centers to HUAWEI CLOUD.
Flexible Image Selection

Allows users to use both public and private images to create ECSs.

  • Convenient: Allows users to create a private image using an ECS or an ECS system disk backup, or create ECSs in batches using an image.
  • Secure: Stores private images using the multi-data-copy mechanism, providing eleven-nines data persistency.
  • Flexible: Allows users to customize image management using the management console or open APIs.
  • Unified: Implements unified application deployment and upgrade using customized images to improve maintenance efficiency. This ensures application environment consistency and simplifies upgrade and maintenance.

Allows users to use both public and private images to create ECSs.

  • Images of various types support rapid deployment of OSs and software on ECSs.
  • Public image: a standard, widely used image on HUAWEI CLOUD. It contains an OS, comes with preinstalled public applications, and is available to all users. Users can configure the application environment and required software using a public image.
  • Private image: an image created using an ECS or external image file and is available only to the user who created it. It contains an OS, preinstalled public applications, and the user’s private applications. Using a private image to create ECSs removes the need to configure multiple ECSs repeatedly.
  • Shared image: a private image shared by another user. It contains an OS, preinstalled public applications, and the user’s private applications and is available only to the image owner and the users with which the private image is shared. Users can select a shared image to create ECSs.
  • Marketplace image: a third-party image that has the OS, application environment, and software pre-installed. Users can use the images to deploy websites and application development environments with a few clicks. No additional configurations are required.
  • With the provided image management and self-service capabilities, users can flexibly use public or private images to create ECSs.
  • Cloud Eye

    Resources, alarms, and notifications can be managed in real time through the Cloud Eye platform.

  • Auto Scaling

    Computing resources are automatically adjusted based on service requirements and AS policies.

  • Elastic Load Balance

    Access traffic is automatically distributed among ECSs.

Cloud Eye

Provides an open monitoring platform for real-time resource monitoring, alarming, and notification.

  • Users can manage ECSs like traditional servers, such as remotely logging in to the ECSs and performing all operations.
  • Real-time: CES samples monitored indexes in real time, correctly generates resource monitoring alarms, and sends notifications to related personnel immediately after the alarms are triggered.
  • Cost-effective: CES is provisioned free of charge and allows users to view monitoring charts in real time.
  • Multiple notification methods: CES supports notification using emails and mobile phone text messages to allow users to promptly check service running status. CES can also send alarms using HTTP to the alarm server, allowing users to handle the alarms using a program.
Auto Scaling

Automatically adjusts computing resources based on user service requirements and periodic/scheduled/alarm-triggered AS policies to ensure stable service running.

  • Flexible: AS automatically increases or decreases the number of instances in an AS group based on various AS policies, such as periodic, scheduled, or alarm-triggered AS policies. Additionally, AS automatically binds the instances newly added to the AS group to a load balancing listener.
  • High availability: AS automatically checks the running status of instances in an AS group, removes unhealthy instances, and enables new instances to ensure proper service running. Additionally, AS allows users to configure multiple AZs and evenly distributes the instances between the AZs.
  • Visualized: AS provides visual display for overall monitoring and intuitively displays monitoring graphs for each AS group, helping users predict service changes and manage O&M.
  • Low cost: Users are charged only for the ECS resources that they used.
Elastic Load Balance

Automatically distributes access traffic to multiple ECSs to balance their service load. It enables higher levels of fault tolerance in user applications and expands application service capabilities.

  • High availability: Uses the redundancy design to automatically remove malfunctioned nodes and reroute traffic between functional nodes to ensure service availability.
  • Highly flexible: Automatically expands the processing capability based on application traffic and seamlessly integrates with AS to meet the requirements posed by traffic changes.
  • High performance: Supports up to 100,000 concurrent connections to meet large traffic requirements. Supports load sharing using Layer 4 protocol (TCP) or Layer 7 protocols (HTTP and HTTPS).

Application Scenarios

  • Web Apps

  • E-commerce

  • Graphics Rendering

  • Data Analysis

  • HPC

Web Apps


No special requirements on CPU, memory, disk space, or bandwidth

Strong security and reliability

Application deployment based on one or only a few ECSs to minimize initial investment and maintenance costs

Application Scenarios

Official website | Website R&D and test | Small-scale DBs

Recommended Solution

  • Use general-purpose ECSs, which provide a balance of computing, memory, and network resources. This ECS type is appropriate for medium-load applications and meets the cloud service needs of both enterprises and individuals.

Recommended Configuration

ECS c2.large
vCPUs Memory Bandwidth IP Disk
2 4 GB 5 Mbit/s 1 Common I/O EVS disk, 100 GB


Large memory

Large data processing volumes

Rapid data switching and processing

Application Scenarios

Precision marketing | E-commerce | Mobile apps

Recommended Solution

  • Use memory-optimized ECSs, which have a large amount of memory and provide ultra-high I/O EVS disks and appropriate bandwidths. This ECS type is suitable for applications that process large amounts of data.

Recommended Configuration

ECS m1.2xlarge
vCPUs Memory Bandwidth IP Disk
8 64 GB 10 Mbit/s 1 Ultra-high I/O EVS disk, 100 GB
Graphics Rendering


Strict graphic and video quality requirements

Large memory and high I/O concurrency, and large data processing volumes

Rapid data switching and processing

High GPU performance

Application Scenarios

HD videos | Graphics rendering | Remote desktops | Engineering drawing

Recommended Solution

  • Use GPU-acceleration ECSs, among which G1 ECSs are developed based on NVIDIA Tesla M60 hardware virtualization and provide cost-effective graphics acceleration. These ECSs support DirectX and OpenGL, provide computing with a maximum of 1 GB video RAM and 4,096×2,160 resolution, and are used for graphics rendering apps.

Recommended Configuration

ECS g1.2xlarge
vCPUs Memory Bandwidth IP Disk
8 16 GB 5 Mbit/s 1 High I/O EVS disk, 100 GB
Data Analysis


Large data processing volumes

High I/O performance and rapid data switching and processing

Application Scenarios

MapReduce and Hadoop

Recommended Solution

  • Use disk-intensive ECSs, which are designed for applications requiring sequential read/write on ultra-large datasets in local storage (such as distributed Hadoop computing) as well as large-scale parallel data processing and log processing. Disk-intensive ECSs are based on HDD and a default network bandwidth of 10GE, providing high PPS and low network latency. They also support up to 24 local disks, 36 vCPUs, and 256 GB of memory.

Recommended Configuration

ECS d1.4xlarge
vCPUs Memory Bandwidth IP Disk
16 128 GB 5 Mbit/s 1 Local disks, 12 x 1.8 TB


High computing performance

High throughput

Application Scenarios

Scientific computing | Genetic engineering | Games and animation | Biopharmaceuticals

Recommended Solution

  • Use high-performance ECSs to meet the computing, storage, and rendering needs of high-performance infrastructure services and applications that require a large number of parallel computing resources.

Recommended Configuration

ECS d1.4xlarge
vCPUs Memory Bandwidth IP Disk
8 16 GB 10 Mbit/s 1 Ultra-high I/O EVS disk, 100 GB
Register Now