Automatically adjusts ECS resources based on the configured AS policies. This improves resource usage and reduces resource costs.
Automatically distributes traffic to multiple ECSs. This enhances system service and fault tolerance capabilities.
Enables you to attach EVS disks to an ECS and expand their capacity.
Enables you to configure internal networks and change network configurations by customizing security groups, VPNs, IP address ranges, and bandwidth. This simplifies network management. You can also customize the ECS access rules within a security group and between security groups to improve ECS security.
Enables you to create ECSs using images. This improves the efficiency of ECS creation.
Allows you to check the status of monitored service objects after you have obtained an ECS. This can be done without requiring additional plug-ins be installed. For details about ECS metrics supported by Cloud Eye, see Basic ECS Metrics.
The encryption feature relies on KMS. You can use an encrypted image or EVS disks when creating an ECS. In such a case, you are required to use the key provided by KMS to improve data security.
Records ECS-related operations for later query, audit, and backtrack.
Backs up EVS disks and ECSs for restoration. You can back up all EVS disks (including the system disk and data disks) attached to an ECS and use the backup to restore the ECS data.
A tag identifies an ECS. Adding tags to an ECS facilitates ECS identification and management.