ECC instances under the same account in the same non-VPC data center are interconnected. Different accounts are isolated from each other and cannot be connected.
Access between ECC instances under the same account in the same VPC can be controlled using ACLs, and access between instances under the same account in different VPCs can be controlled using Peering.
All bandwidth is occupied. It is recommended that you upgrade the bandwidth plan.
Please check the password you entered. Currently, uppercase and lowercase letters, numbers and special characters are supported. Special characters include: @#${}%*()=+_!?,
A ECC instance in a VPC cannot be accessed directly. If remote access is required, you need to add the ECC instance to a security group, and then set protocols in inbound and outbound security group rules to control the access.
Security setting determines the number of failed login attempts that cause your account to be locked. The locked account cannot be used until the administrator resets it or the account locking period expires. You can set the number of failed login attempts to a value between 0 and 999. If the value is set to 0, the account will never be locked. This issue can be solved by shutting down the ECC instance and reinstalling the system. If it is not convenient to reinstall the system on your computer, you can contact the background personnel to help you unlock your account.
The default user name of a Windows ECC instance is administrator. If you forget the password, you can shut down the ECC instance first through the console, and then choose “More > Reset Password” to reset the instance password.
At present, YiSu Cloud provides the following internal network services:
The CentOS image provided by YiSu Cloud is a standard image, and the VNC service is not installed by default. For detailed installation and configuration, visit http://wiki.centos.org/zh/HowTos/VNC-Server.
For a ECC instance without public network bandwidth purchased, the system will not assign a public IP address. In this case, you need another ECC instance with a public IP address to access the ECC instance over the internal network.
Please check your firewall settings first. To enhance the ECC instance security, each firewall does not contain any rule in initial state, and all ports are closed. You need to create rules to open corresponding ports.
Yes. Different image sources for different Ubuntu versions can be downloaded (DNS must be added first).
YiSu Cloud provides standard system images, and the system processes are regular standard processes. If there is an unusual process, your ECC instance may experience security risks. It is recommended that you install Server Security Products to troubleshoot security issues such as Trojans, viruses, and zombie computers. If necessary, you can reinstall the system, change the password, or use a key instead of a password for login.
YiSu Cloud provides ECC instances only. You can deploy application layer services as needed. You can try to deploy a VPN by using OpenVPN.
The free system disk capacity is 50G for windows, and 20G for Linux.
At present, a single ECC instance provides a basic bandwidth of up to 5 Gbit/s to prevent against DDoS attacks. When it is attacked, the equipment of YiSuCloud can clean the attack traffic, discard malicious traffic, and ensure normal business communication.
If you experience DDoS over 5G attacks frequently, it is recommended that you purchase the YiSuCloud Anti-Attack Service(Anti-DDoS IP).
Generally, different web servers (such as Apache and NGINX) may be stored in different places. You can check whether there is a file containing “log” in the background through FTP, and this file is the log file.
Common footprints in logs include: GoogleBot for Google web bots, BaiDuSpider for Baidu web bots, and InktomiSlurp for Yahoo web bots.
CPU load is the statistical information of the number of processes that are being processed by CPU and waiting for CPU to process over a period of time, while utilization refers to usage of processing resources. If a process keeps using CPU, the CPU utilization may reach 100%. CPU load and utilization are not correlated necessarily, but both of them can be used as a reference for specific usage of CPU.